The General Data Protection Regulation is now, effectively, law. Businesses have 730 days from official publication (expected to be in June) to comply. It...
Hi, what are you looking for?
The General Data Protection Regulation is now, effectively, law. Businesses have 730 days from official publication (expected to be in June) to comply. It...
The California Assembly Bill 1681 was quietly dropped this week without a vote. The bill would have authorized $2,500 penalties for phone manufacturers and...
Any information security professional knows that spear-phishing is effective. Cloudmark calls it "The Secret Weapon Behind the Worst Cyber Attacks", and lists 10 recent...
Security researcher Mike Olsen's recent discovery of a malicious iFrame in the embedded control code of a set of security cameras purchased from Amazon...
News via a German leak concerning European regulators' attitudes towards Privacy Shield was published last week with the headline, "EU-US Privacy Shield in big...
Released today, Symantec's Internet Security Threat Report 2016 (ISTR) is a data-based analysis of cybersecurity events and issues over the last year. Symantec has...
Atmos, a derivative of the ZeuS/Citadel stable, has been detected targeting banks in France. The malware has been active since late 2015, but this...
A hacktivist group calling itself the Cyber Justice Group announced on Twitter that it has dumped 10GB of data from the Syrian government. The...
Time was when you could trust big names. Not any more – in fact 'big names' are increasingly targeted by the bad guys simply...
Recruitment remains a major problem for cyber security departments, and there seems to be no easy solution. One difficulty is that the issue is...
Ask any chief information security officer (CISO) what worries him most about cloud migration and he is likely to reply, 'visibility'. When data goes...
"Cyber AIR" Act Would Direct FAA to Establish Cybersecurity Standards for AircraftSenator Edward Markey (D-Mass.), Thursday, introduced a proposed new Cyber AIR Act as...
The DHS ICS-CERT issued three security advisories on industrial control systems (ICS) this week, again showing that critical infrastructure and industrial networks continue to face...
A report has claimed that there are vulnerabilities in the US Consular Consolidated Database (CCD) that contains personal details from everyone who has applied...
While we wait to discover what and how the Trump Hotel Collection was breached, a new version of the TinyPOS point-of-sale (PoS) malware has...
Hackers have dumped a database apparently containing personal details of almost 50 million Turkish citizens. The details were posted to an Icelandic organization that...
Passive Authentication May be the Future for User Authentication, and it's Just Beginning to Appear
A new survey and report from Tanium and NASDAQ, using a research team from Goldsmiths, University of London, seeks to quantify organizations' cyber security...
2.6 Terabytes of Leaked Documents From Panama Law Firm Mossack Fonseca Expose World Leaders, Tax Havens and Shell Companies
The UK government's attempts to ease the passage of the hugely controversial Investigative Powers Bill continued this week with a Telegraph opinion piece from...