Released today, Symantec's Internet Security Threat Report 2016 (ISTR) is a data-based analysis of cybersecurity events and issues over the last year. Symantec has...
Hi, what are you looking for?
Released today, Symantec's Internet Security Threat Report 2016 (ISTR) is a data-based analysis of cybersecurity events and issues over the last year. Symantec has...
Atmos, a derivative of the ZeuS/Citadel stable, has been detected targeting banks in France. The malware has been active since late 2015, but this...
A hacktivist group calling itself the Cyber Justice Group announced on Twitter that it has dumped 10GB of data from the Syrian government. The...
Time was when you could trust big names. Not any more – in fact 'big names' are increasingly targeted by the bad guys simply...
Recruitment remains a major problem for cyber security departments, and there seems to be no easy solution. One difficulty is that the issue is...
Ask any chief information security officer (CISO) what worries him most about cloud migration and he is likely to reply, 'visibility'. When data goes...
"Cyber AIR" Act Would Direct FAA to Establish Cybersecurity Standards for AircraftSenator Edward Markey (D-Mass.), Thursday, introduced a proposed new Cyber AIR Act as...
The DHS ICS-CERT issued three security advisories on industrial control systems (ICS) this week, again showing that critical infrastructure and industrial networks continue to face...
A report has claimed that there are vulnerabilities in the US Consular Consolidated Database (CCD) that contains personal details from everyone who has applied...
While we wait to discover what and how the Trump Hotel Collection was breached, a new version of the TinyPOS point-of-sale (PoS) malware has...
Hackers have dumped a database apparently containing personal details of almost 50 million Turkish citizens. The details were posted to an Icelandic organization that...
Passive Authentication May be the Future for User Authentication, and it's Just Beginning to Appear