All recent articles

IBM’s X-Force team hacks into smart building

Feb 10, 2016

As buildings get smarter and increasingly connected to the Internet, they become a potential vector for attackers to target.IBM’s X-Force ethical hacking team recently ran…

China’s next five-year plan offers preview of cybersecurity targets

Feb 3, 2016

Is your industry next in line to be targeted by China’s government-sponsored hackers? To find out, look at China’s latest five-year plan, suggests a global…

Survey: Average successful hack nets less than $15,000

Feb 2, 2016

The majority of cyber attackers are motivated by money, but make less than $15,000 per successful attack, according to a survey of hackers in the…

Survey: Average successful hack nets less than $15,000

Feb 2, 2016

The majority of cyber attackers are motivated by money, but make less than $15,000 per successful attack, according to a survey of hackers in the…

27% of all malware variants in history were created in 2015

Jan 29, 2016

Last year was a record year for malware, according to a new report from Panda Security, with more than 84 million new malware samples collected…

Cybersecurity pros switch jobs for challenging work, pay, and flexible hours

Jan 27, 2016

Cybersecurity pros are most likely to leave to find more challenging work, better pay, and more flexible working hours, according to a survey released this…

Over 113 million health records breached in 2015 — up 10-fold from 2014

Jan 27, 2016

One out of every three Americans was affected by a healthcare record breach last year, or more than 113 million people, up more than 10-fold…

Preparation lowers long-term post-breach costs

Jan 26, 2016

Preparation can significantly lower the long-term costs of a breach, according to a SANS report released this morning. Companies that had plans in place, that…

Reporting to CEO reduces risks and costs, but change comes slowly

Jan 26, 2016

An increasing number of experts are urging companies to stop having the CSOs and CISOs report to the CIO in order to reduce conflict of…

Reporting to CEO reduces risks and costs, but change comes slowly

Jan 26, 2016

An increasing number of experts are urging companies to stop having the CSOs and CISOs report to the CIO in order to reduce conflict of…

Telephonic DoS a smokescreen for cyberattack on Ukrainian utility

Jan 25, 2016

The late December telephonic denial-of-service attack against a Ukrainian power company was a smokescreen to cover up a cyber attack, experts say.”This is one of…

Telephonic DoS a smokescreen for cyberattack on Ukrainian utility

Jan 25, 2016

The late December telephonic denial-of-service attack against a Ukrainian power company was a smokescreen to cover up a cyber attack, experts say.”This is one of…

Report: Cybersecurity pros losing confidence

Jan 19, 2016

Security professionals were less confident in their security infrastructure in 2015 than in 2014, according to a report released today by Cisco.In 2014, 64 percent…

Linux zero-day affects most Androids, millions of Linux PCs

Jan 19, 2016

A new zero-day vulnerability has been discovered that allows Android or Linux applications to escalate privileges and gain root access, according to a report released…

Linux zero-day affects most Androids, millions of Linux PCs

Jan 19, 2016

A new zero-day vulnerability has been discovered that allows Android or Linux applications to escalate privileges and gain root access, according to a report released…

Linux zero-day affects most Androids, millions of Linux PCs

Jan 19, 2016

A new zero-day vulnerability has been discovered that allows Android or Linux applications to escalate privileges and gain root access, according to a report released…

Security pros worried about stolen credentials, alert volumes

Jan 13, 2016

The majority of security organizations received more alerts than they can handle and don’t have a way to spot stolen credentials, according to a survey…

RIG exploit kit takes over while Angler on vacation

Jan 12, 2016

The Angler exploit kit went on vacation during the first two weeks of the year, but the Russia-hosted RIG exploit kit was there to ensure…

DDoS attack on BBC may have been biggest in history

Jan 8, 2016

Last week’s distributed denial of service attack against the BBC website may have been the largest in history.A group calling itself New World Hacking said…

DDoS attack on BBC may have been biggest in history

Jan 8, 2016

Last week’s distributed denial of service attack against the BBC website may have been the largest in history.A group calling itself New World Hacking said…

Silent Circle patches Blackphone vulnerability

Jan 6, 2016

A report released this morning shows that no phone is 100 percent secure — but that one company, at least, is able to respond quickly…

Global geopolitical risk predictions for 2016

Jan 4, 2016

The previous 25 years have been marked by globalization. A number of forces acted together to bring our planet closer together. Trade pacts, peacekeeping alliances,…

PhishMe report shows employees can become assets in anti-phishing battle

Dec 21, 2015

A report released today by PhishMe based on the results of 8 million phishing simulations shows that employees can dramatically improve their ability to detect…

PhishMe report shows employees can become assets in anti-phishing battle

Dec 21, 2015

A report released today by PhishMe based on the results of 8 million phishing simulations shows that employees can dramatically improve their ability to detect…

Lost devices account for bulk of healthcare security incidents

Dec 16, 2015

Due to reporting guidelines, lost and stolen devices account for 45 percent of all breaches in Verizon’s new health care data breach report, accounting for…

Firms expect fines, new costs from Safe Harbor changes

Dec 14, 2015

IT budgets are expected to see a rumble of activity in the wake of the Safe Harbor earthquake.In a new Ovum survey of IT decision…

Darkode forum is back, but a shadow of its former self

Dec 8, 2015

Last summer, law enforcement agencies from 20 countries joined forces to shut down the notorious Darkode hacking forum. Organizers said they would be back, stronger…

Darkode forum is back, but a shadow of its former self

Dec 8, 2015

Last summer, law enforcement agencies from 20 countries joined forces to shut down the notorious Darkode hacking forum. Organizers said they would be back, stronger…

Darkode forum is back, but a shadow of its former self

Dec 8, 2015

Last summer, law enforcement agencies from 20 countries joined forces to shut down the notorious Darkode hacking forum. Organizers said they would be back, stronger…

US cyber criminal underground a shopping free-for-all

Dec 7, 2015

According to a new report by Trend Micro, the North American cyber criminal underground isn’t buried as deep as in other geographies.”It doesn’t exist in…