Information security firm High-Tech Bridge has launched a new free service to help web site owners and businesses understand and locate domain name threats...
Hi, what are you looking for?
Information security firm High-Tech Bridge has launched a new free service to help web site owners and businesses understand and locate domain name threats...
It was reported today that multiple forms of malware have been found in a German nuclear energy plant in Gundremmingen, 75 miles north-west of...
Hackers are Using Increasingly Sophisticated Methods of Cloaking Their Behavior When Breaching Networks
AXELOS, a UK firm with strong ties to the UK government Cabinet Office, yesterday published a stinging criticism on business security awareness training in...
A hacker using the handle "Phineas Fisher" has described how he hacked into surveillance software maker Hacking Team. Hacking Team is an Italian firm...
Microsoft Publishes White Papers on Incident Response and Shared Responsibility for Azure Cloud Customers
The General Data Protection Regulation is now, effectively, law. Businesses have 730 days from official publication (expected to be in June) to comply. It...
The California Assembly Bill 1681 was quietly dropped this week without a vote. The bill would have authorized $2,500 penalties for phone manufacturers and...
Any information security professional knows that spear-phishing is effective. Cloudmark calls it "The Secret Weapon Behind the Worst Cyber Attacks", and lists 10 recent...
Security researcher Mike Olsen's recent discovery of a malicious iFrame in the embedded control code of a set of security cameras purchased from Amazon...
News via a German leak concerning European regulators' attitudes towards Privacy Shield was published last week with the headline, "EU-US Privacy Shield in big...
Released today, Symantec's Internet Security Threat Report 2016 (ISTR) is a data-based analysis of cybersecurity events and issues over the last year. Symantec has...