Hi, what are you looking for?
Microsoft to Solve Document Cloud Compliance and Visibility Issues With Azure Information Protection
It was reported last week that a hacker had accessed the video conferencing system of the Parti Libéral du Québec (PLQ) and eavesdropped on...
Flash is one of the most abused pieces of software in use. Flexera Software's Vulnerability Review 2016 counts 457 vulnerabilities in 2014 and 2015...
Global law enforcement agencies have been sharing intelligence to crack down on airline ticket fraud, and appear to be taking action roughly every six...
The value of Ethereum, a cryptocurrency somewhat similar to bitcoin, has plummeted following a hack on The DAO's Ethereum holdings. The DAO is a...
The 2016 Ponemon 'Cost of Data Breach Study' shows that breach-related costs are continuing to rise: a 29% increase in the total cost since...
The choice between using a single vendor platform, and integrating best-of-breed point products from different vendors is as old as computing - but is...
Researchers have recently noted a large scale switch from the Angler exploit kit (EK) to the Neutrino exploit kit. Last Wednesday SANS ISC noted...
Two Israeli citizens, arrested in Israel in July 2015 and extradited to the US this week pleaded guilty Thursday to orchestrating a computer hacking...
$2.3 billion stolen from 17,642 victims in at least 79 countries. These are the current figures for the growing scourge known as business email...
The FFIEC has issued a statement alerting US financial institutions (FIs) to the interbank transfer threat following the recent spate of SWIFT-based attacks and...