News & Blog

Donald Trump's US-Russia joint cyber unit may become a reality as Kremlin confirms 'talks underway'

Trump previously tweeted about creating a cybersecurity unit after talks with Putin but backtracked after receiving flak.

Read More

AWS S3 Breaches: What to Do & Why

Although basic operations in Amazon's Simple Storage Services are (as the name implies) - simple - things can get complicated with access control and permissions.

Read More

Cyber security training must reflect real risks

The Institute of Information Security Professionals (IISP) – the not-for-profit body that represents information security professionals – is warning companies to invest wisely in cyber security training services with an eye on quality and real benefits.

Read More

Web App Vulnerabilities Decline 25% in 12 Months

WhiteHat Security's annual Web app report shows the average number of vulns in a Web app is down from four to three.

Read More

Bankers Are Hiring Cyber-Security Experts to Help Get Deals Done

Global threats, recent WannaCry ransom attack fuel awareness
Cybersecurity will increasingly become part of deal-vetting

Read More

Banks Must Focus More on Cyber-Risk

Recent guidelines from the Federal Reserve are aimed at stemming the tide of successful exploits.

Read More

Protecting Small Business from Increasing Cyber Attacks

Small businesses are vulnerable to large scale cyber attacks – Here’s how to keep your business protected.

Read More

FBI Chief Calls for United Fight Against Cybercrime

James Comey stresses the need to address encryption challenges faced by law enforcement.

Read More

Why Internet of Things is the world’s greatest cyber security threat

The largest DDoS attack in history is just the tip of the iceberg.

Read More

Fewer Than One-Fourth Of Cybersecurity Job Candidates Are Qualified

ISACA report finds that 55% of security jobs take three- to six months to fill, and under 25% of candidates are qualified for the jobs they apply for.

Read More

PayPal phishing scam: How to avoid becoming a victim of the fraud

Hackers have been sending fake emails making users believe that their PayPal account has been limited.

Read More

Jobs in Cyber Security Increased by 300% Worldwide

In the UK alone, fraud has hit record levels of £1.1 billion, and with the European Union’s GDPR set to come into effect from May 2018, cybercrime is at the top of the everyone’s agenda – from governments to businesses large and small, even individuals.

Read More

Mobile Security Gap Threatens Enterprises

Rush to release, rapid growth in mobile malware is exacerbating the problem, two reports show.

Read More

How Blockchain Can Revolutionize Personal Data Storage?

Learn everything about Blockchain and Personal Data Storage.

Read More

The Biggest Security Threats Coming in 2017

Whether it was a billion compromised Yahoo accounts or state-sponsored Russian hackers muscling in on the US election, this past year saw hacks of unprecedented scale and temerity. And if history is any guide, next year should yield more of the same.

Read More

A Cybersecurity Christmas Story

Automation and orchestration will be essential components of security in 2017.

Read More

Russian Hackers Run Record-Breaking Online Ad-Fraud Operation

'Methbot' is a sophisticated cybercrime scheme that has hit major US advertisers and publishing brands and pilfered millions of dollars per day.

Read More

Real-World Fallout From The Cybersecurity Skills Gap

Two new studies connect the dots between an organization's lack of staffing and skills to its ability to fend off cyberattacks.

Read More

CIA: Russian Hackers Aimed To Help Trump Win

Intelligence suggests Russia hacked the Republican National Committee but didn't leak its data, a sign experts say is indicative of broader plans to sway US election results.

Read More

US Presidential Commission Outlines Key Cybersecurity Actions For Future Administrations

Report outlines ways to lock down critical infrastructure as well as IoT - and the urgent need to expand the security workforce by 2020 with 100,000 new jobs.

Read More

Protect Your Company From Hackable Holiday Gifts

This holiday season promises to be full of devices, apps, and connectivity. Planning and executing appropriate security precautions now will save your business from a serious breach later.

Read More

San Francisco's transport system held to ransom in cyberattack giving passengers free rides for Thanksgiving

Over 2,000 systems were reportedly hit by a variant of the HDDCrypto ransomware.

Read More

The True Cost of a Cyberattack

Though a cyberattack could happen at any moment, a lot of organizations are ill-prepared and don’t have a plan set up to deal with the aftermath of such an occurrence.

Read More

Do You Need a Threat Intelligence Team?

I have the great opportunity to spend time with CSOs and IT executives to understand their cybersecurity concerns and help them map out a strategy for success.

Read More

Cyber Monday, Consumers & The Bottom Line Of A Data Beach

Yes retailers can achieve ROI for their investments in cybersecurity during the upcoming holiday season - and for the rest of the year, too! Here's how.

Read More

US Army Challenges Security Researchers To 'Bring It On'

Army to offer cash rewards to bug hunters who find security vulnerabilities in its recruiting sites and database systems that have ties to the Army's core operational systems.

Read More

75,000 Data Protection Officers Needed By 2018 To Handle EU Law

US alone will need 9,000 DPOs to meet GDPR mandates, says International Association of Privacy Professionals - but don't expect that many new job listings.

Read More

Can Electronic Voting Machines Be Hacked?

With the election now in just weeks and the republican nominee, Donald Trump, stating numerous times that it will be rigged, electronic voting once more takes center stage with concerns raised that electronic voting machines could be hacked.

Read More

Business Security Confidence Contradicts High Success Rate Of Attacks

Research indicates one in three cyberattacks results in a security breach, but most organizations are confident in their defense tactics.

Read More

How Clinton, Trump Could Champion Cybersecurity

The major party Presidential candidates, which both have experienced the aftermath of hacks and poor security practices of their own, could serve as 'poster children' and advocate for better cybersecurity, experts say.

Read More

20 Endpoint Security Questions You Never Thought to Ask

The endpoint detection and response market is exploding! Here's how to make sense of the options, dig deeper, and separate vendor fact from fiction.

Read More

New Free Tool Stops Petya Ransomware & Rootkits

Meanwhile, Locky puts ransomware on the Check Point Top Three Global Malware List for the first time ever.

Read More

A Job In Security Leads To Job Security

Developers who focus on secure development skills find themselves in high demand.

Read More

How To Become A Cybersecurity Entrepreneur In A Crowded Market

If you want to build the next great cybersecurity startup, use your expertise, then follow these three simple suggestions.

Read More

Most Small Businesses Lack Response Plan For Hacks

Half of small business owners have experienced malware, phishing, Trojans, hacking, and unauthorized access to customer data, according to Nationwide survey.

Read More

Russia, Russia, Russia: What Clinton Or Trump Can Do About Nation-State Hacking Gone Wild

US mulls 'proportional' response to Democratic Party hacks in midst of an unprecedented presidential campaign clouded by cybersecurity concerns (among other things).

Read More

The Benefits of Blockchain Technology in Healthcare

A blockchain-based information exchange could remove friction and costs presented by intermediaries in existing health information exchanges, according to a Deloitte white paper on blockchain’s potential benefits for health care titled, “Blockchain: Opportunities for Health Care.”

Read More

Data Science & Security: Overcoming The Communication Challenge

Data scientists face a tricky task -- taking raw data and making it meaningful for both security and business teams. Here's how to bridge the gap.

Read More

China's 400,000 cybercriminals are costing the nation an estimated $15bn a year

China's increasing dependence on mobile payment may be making it an attractive target for hackers.

Read More

How A Pair Of Cybercriminals Scales Its Carder Business

'Vendetta Brothers' cybercrime duo runs site that offers cards stolen from over 600 banks in 41 countries, FireEye says.

Read More

Clinton, Trump Debate 'Twenty-First Century War' Of Cyberattacks

Lester Holt led with topic of cybersecurity as the first question on national security in last night's Presidential debate.

Read More

Donald Trump's luxury hotel chain fined for cybersecurity failure

The hotel's payment systems exposed more than 70,000 customer credit card numbers.

Read More

Spam Levels Spike, Thanks In Part To Ransomware

By shipping banking Trojans and ransomware that turn big profits fast, spammers can now afford the high overhead of high-volume spam campaigns.

Read More

The Biggest Bitcoin Hacks and Thefts of All Time

The story of bitcoin’s biggest hacks and thefts is the story of bitcoin itself. From its early days and its first hack, to the biggest theft of all time, bitcoin’s utopian promises often turned into a dystopian reality where scammers, thieves, unaccountable and often amateur exchanges, some, even fully anonymous, proliferated in a wild west of euphoria and hope for a new future combined with devastating, and at times, tragic loss.

Read More

Central banks seek global standards in wake of Bangladesh heist

The world's major central banks, stung by this year's $81-million heist in Bangladesh, have launched a task force to consider setting broad rules to protect the vast network of cross-border banking from cyber attacks, according to two sources with knowledge of the matter.

Read More

Google Chrome To Flag Non-HTTPS Logins, Credit Card Info 'Not Secure'

The move is part of a larger Google push to lock down Web traffic using encryption between the browser and Web server.

Read More

Let’s Get Smarter About Security By Working Together

We all need help, and only by working together can we move the needle on security.

Read More

Obama Calls For Norms To Prevent 'Cyber Wild Wild West'

At G-20 summit, US President warns of a free-for-all if urgent measures are not taken by countries with cyber weapons capabilities.

Read More

Why Social Media Sites Are The New Cyber Weapons Of Choice

Facebook, LinkedIn, and Twitter can't secure their own environments, let alone yours. It's time to sharpen your security acumen.

Read More

FTC Warns Travelers About Cybersecurity Risks Of Rental Cars

The Federal Trade Commission has recommendations for consumers to protect their personal data when driving rental vehicles.

Read More

Critical Infrastructure: The Next Cyber-Attack Target

Power and utilities companies need a risk-centric cybersecurity approach to face coming threats.

Read More

Global Cost of Cybercrime Predicted to Hit $6 Trillion Annually By 2021, Study Says

Start saving now. The global cost of cybercrime could reach $6 trillion by 2021, according to a Cybersecurity Ventures report.

Read More

Security Leadership & The Art Of Decision Making

What a classically-trained guitarist with a Master's Degree in counseling brings to the table as head of cybersecurity and privacy at one of the world's major healthcare organizations.

Read More

Researchers crack facial security systems using 3D faces based on Facebook photos

Researchers found they could trick four out of five systems used to lock smartphones and safeguard data.

Read More

The Clinton Foundation fear donation data stolen after suspected hack

Officials spotted 'indications' it was compromised by 'spearphishing' tactics.

Read More

What Mr. Robot Can Teach Businesses About Security

By getting the underlying technology right, Mr. Robot producers understand they boost the show's credibility and give businesses and their customers a more realistic view of security, risk and the challenges of data protection.

Read More

Security Training at Most Companies is Woefully Lacking

Human error and lack of internal security awareness are the biggest sources for data breaches and risk to organizations. Yet 78% of SMBs conduct security training just once a year (or less).

Read More

Son of Russian MP facing trial for orchestrating $170m credit card hacking spree

'Master hacker' Roman Seleznev is facing a 40-count indictment in the US.

Read More

The Future Of ATM Hacking

Research released at Black Hat USA last week shows that one of our best defenses for the future of payment card and ATM security isn't infallible. Here's why.

Read More

The Future of Cybersecurity May Be with Supercomputers

Seven supercomputers recently took part in a virtual contest that saw them competing against one another in a bid to find software vulnerabilities.

Read More

New Internet Security Domains Debut

Meet the new .security and .protection domains.



Read More

Hacker Creates Software Ratings System

A famed hacker who nearly 20 years ago told Congress he could take down the internet in 30 minutes is now going after the computer software industry, whose standard practices all but guarantee that most products will be vulnerable to cyber attacks.

Read More

Founder of China’s largest ‘ethical hacking’ community arrested

The founder of an “ethical hacking” community in China, Fang Xiaodun, was arrested by Chinese authorities a week ago according to Chinese news outlet Caixinwang.

Read More

Kickass Torrents mirrors shut down by US officials and Hollywood studios

Kat.am has claimed that it has retained its database and has already launched two new mirrors.

Read More

Second Democratic Party Website Hacked

In a DNC-like attack, pro-Russian hackers broke into a website belonging to the Democratic Congressional Campaign Committee -- and reportedly also the Clinton campaign website.

Read More

Russia now collecting encryption keys to decode information from Facebook, WhatsApp and Telegram

Russia's Federal Security Service says it now has a method to collect encryption keys to spy on users' data.

Read More

Obama Issues Federal Government Policy For Cyberattack Response

New Presidential Policy Directive, PPD-41, solidifies just how key federal agencies coordinate, respond to cyberattacks on federal and private networks.

Read More

New Portal Offers Decryption Tools For Some Ransomware Victims

Nomoreransom.org, a joint initiative between Europol, the Dutch National Police, Kaspersky Lab and Intel Security, offers help in getting encrypted data back.

Read More

Tools & Training To ‘Hack Yourself’ Into Better Security

How to teach your blue team to think like the red team when your network is under attack and time is your most valuable asset.

Read More

National Governors Association Seeks Higher Profile on Cybersecurity

NGA's new chairman Virginia Gov. Terry McAuliffe says states can play a pivotal role in cybersecurity, including emergency response, workforce development and protecting health care data.

Read More

Google reveals government surveillance at all-time high

US, Germany, France, UK and India top surveillance requests list.

Read More

US Cyber Mission Force Nearly Ready for Action

The US military’s Cyber Mission Force will finally be ready for action by the end of September, according to US Cyber Command and NSA boss, Admiral Michael Rogers.

Read More

Pentagon not impressed over slow start of cyberwar against Isis

The US military's first of its kind cyberwar campaign against the Islamic State (Isis) is off to a slow start and this has left Pentagon officials frustrated. The US Cyber Command was established to undermine IS's (Daesh) online activities, specifically concerning online recruitment and planned attacks. However, the unit is yet to develop malware and other tools to launch offensive attacks.

Read More

Microsoft wins landmark appeal over seizure of foreign emails

A federal appeals court on Thursday said the U.S. government cannot force Microsoft Corp and other companies to turn over customer emails stored on servers outside the United States.

Read More

ICS Mess: US Industrial Systems The Most Exposed

New data shows vulnerable ICS equipment even as vendors are improving security.

Read More

Covert Voice Commands Can Hack A Smartphone

Researchers from Georgetown University and the University of California, Berkeley say cybercriminals could use hidden voice commands via popular YouTube videos to infect Androids and iPhones with malware.

Read More

Saving The Security Operations Center With Endpoint Detection And Response

EDR is the beginning of our return to control in the fight against cybercrime.

Read More

Obama: Cybersecurity in Government Concerns Me

U.S. President Barack Obama has admitted that the White House has been the target of hacking incidents while adding that the state of cybersecurity “throughout the government, in general.”

Read More

NATO Ambassador: How The Ukraine Crisis Fits Cyber War Narrative

Kenneth Geers previews his Black Hat talk and discusses the strategic military maneuvers governments can make within cyberspace.

Read More

West Point Trains Female Cadets For Cyber Branch

An internship at a Silicon Valley startup is one program aimed at helping close the cybersecurity skills gap.

Read More

Meet Hummer, the No.1 Mobile Trojan in the World

A newly found mobile trojan family has quickly become the No. 1 Android malware in the world. As of the end of June, the average number of Hummer-infected phones stands at almost 2 billion, which is a larger install base than any other mobile phone trojan.

Read More

China’s Economic Cyber-Spying Drops Post Sept Talks: US Official

U.S. Assistant Attorney General John Carlin's statement finds support in FireEye report of a 90% fall in China-based hacking.

Read More

Why Passwords Are the New Exploits

Twitter, 33 million. LinkedIn, 165 million. Tumblr, 65 million. VK.com, 171 million. Badoo, 127 million. Myspace, 360 million.

Read More

Microsoft + LinkedIn: How To Spot Insider Trading Risk Early

How open communication among security execs and analysts, incidents responders, and engineers can help organizations stay on top of the constantly changing threat landscape.

Read More

Mind The Gap: CISOs Versus 'Operators'

How open communication among security execs and analysts, incidents responders, and engineers can help organizations stay on top of the constantly changing threat landscape.

Read More

'Smart' Building Industry Mulls Cybersecurity Challenges

New 'attraction and curiosity' for infosec at the Intelligent Buildings Conference this week.

Read More

Bangladesh Bank To Meet With NY Fed Over Pilfered $81 Million

Meeting next month to focus on speedy recovery of the money -- most of which has disappeared into Philippine casinos.

Read More

China Still Successfully Hacking US, But Less

New FireEye report shows significant decline in the number of Chinese cyber espionage attacks on the US since 2014, but China has definitely not stopped the intellectual property theft.

Read More

The Gamble Behind Cyber Threat Intelligence Sharing

In theory, sharing threat intel makes sense. But in cybersecurity you're not dealing with known individuals, you're dealing with anonymous adversaries capable of rapid change.

Read More

NATO Officially Declares Cyberspace A Domain For War

Cyberattack on a NATO ally will now trigger a collective response.

Read More

North Korean Hackers Stole F-15 Jet Fighter Blueprints

South Korean police are alleging that its neighbor to the north has hacked into over 140,000 computers at various South Korean firms and governmental agencies in an effort to launch a massive cyber attack against the country. Defense-related material was also allegedly stolen, including non-classified F-15 fighter jets’ wings blueprints.

Read More

5 Soft Skills Young Cybersecurity Professionals Need to Get Ahead

Today's employers aren't looking for recruits who can maintain firewalls and mitigate risk. They want well-rounded professionals who can apply security expertise across the business to yield bottom-line results.

Read More

Twitter Says Its Servers Were Not Breached

Account details leaked are from other hacked websites, claims the social media tool.

Read More

An Interview With the Hacker Probably Selling Your Password Right Now

For the last two weeks, the tech world’s security teams have been practically under siege. On an almost daily basis, new collections of data from hundreds of millions of stolen accounts have appeared on the dark web, ripped from major web firms and sold for as little as a few hundred dollars each worth of bitcoins. And behind each of those clearance sales has been one pseudonym: “Peace_of_mind.”

Read More

Passwords for 32M Twitter accounts may have been hacked and leaked

There is yet another hack for users of popular social media sites to worry about. Hackers may have used malware to collect more than 32 million Twitter login credentials that are now being sold on the dark web. Twitter says that its systems have not been breached.

Read More

Symantec Drives Into Automobile Security

Automakers quietly begin testing cybersecurity features for connected cars.

Read More

Hackers Access Mark Zuckerberg’s Twitter, Pinterest Accounts

OurMine Team claims hack is a fallout of LinkedIn leak; Zuckerberg reportedly may have used same password for other accounts.

Read More

FBI Alerts To Rise In Extortion Email Schemes

Fraudsters threaten to release details of high-profile breaches unless paid 2 to 5 bitcoins, says intelligence agency.

Read More

How Facebook Raises A Generation Of Intelligence Analysts

In the process of creating and administering groups, users learn how to read data points, create a risk profile in their head, and watch for changes over time.

Read More

More Evidence Of Link Between Bank Attacks And North Korean Group

Anomali says it has found five new pieces of malware tying the two attack groups together.

Read More

10 Sea-Changing IT Security Trends Of The Last 10 Years

A look at ten of the megatrends that have shaped IT security -- and in some cases, enterprise business -- over the last decade.

Read More

A hacker explains why US nukes controlled by ancient computers is actually a good thing

A new government report on Wednesday revealed that America's nukes are still being controlled by antique computers with 8-inch floppy disks, but a former white hat hacker says that's not necessarily a bad thing.

Read More

11+ security questions to consider during an IT risk assessment

IT risk assessments are crucial to minimize the fallout from cyberattacks. Experts explain why and suggest what questions to consider to assess your company's risk.

Read More

State Department argues against ‘cyber arms’ treaty

Senior State Department official says cyber is fundamentally different than any sort of conventional military or diplomatic arena, urges ongoing and multilateral development of ‘norms’ in global Internet talks.

Read More

A Wish List For The Security Conference Stage

All the world may be a stage, but in the theater of cybersecurity, we need a more relevant dialogue of fresh ideas, novel approaches, and new ways of thinking.

Read More

New Internet Of Things Security-Certification Program Launched

ICSA Labs now offers a security testing program for IoT products, following the recently announced 'CyberUL' security certification program.

Read More

CompTIA report: Almost half of companies believe their security is 'good enough'

A recent security report from CompTIA found that while threats are growing stronger, many enterprises still aren't ready to face them.

Read More

Criminal defendants demand to see FBI's secret hacking tool

The ability of defendants to confront the evidence against them is 'absolutely essential,' civil rights groups argue

Read More

There’s finally reason to hope in the war against ransomware

A researcher talks about ways to cut short attacks, protect files from encryption

Read More

The 18 scariest computer viruses of all time

The Anna Kournikova virus is so named because it tricked its recipients into thinking they were downloading a sexy picture of the tennis star.

Read More

Cloud SLAs: What Everyone Should Know

13 questions to ask your service providers to better understand their service offerings and your risks.

Read More

Cybersecurity in 2020: The future looks bleak

Experts offer five scenarios they suspect will wreak havoc on cybersecurity by 2020.

Read More

Russian National Receives 5 Years In Jail For Role In 'Citadel' Attacks

Mark Vartanyan is the second individual to be sent to prison in connection with Citadel.

Read More

How Active Intrusion Detection Can Seek and Block Attacks

Researchers at Black Hat USA will demonstrate how active intrusion detection strategies can help administrators detect hackers who are overly reliant on popular attack tools and techniques.

Read More

IT Leaders Still Believe Perimeter Security Can Keep Hackers Out

IT decision makers are dangerously over-confident in the ability of perimeter security to keep key assets safe from hackers, with UK professionals even more self-assured than the global average, according to new data from Gemalto.

Read More

Cybersecurity Fact vs. Fiction

Based on popular media, it's easy to be concerned about the security of smart cars, homes, medical devices, and public utilities. But how truly likely are such attacks?

Read More

How to Crack Cybersecurity’s Glass Ceiling

Sage career advice to young women from the female CTO of a security startup: Get a pair of earplugs, and put them in when you hear words like 'can't' or 'don't.'

Read More

Future of the SIEM

Current SIEM systems have flaws. Here's how the SIEM's role will change as mobile, cloud, and IoT continue to grow.

Read More

Banks Spend on IT Security is 3x Higher Than Non-Financial Organisations

Financial institutions are under pressure to ramp up security, with trends such as the increased take-up of mobile banking putting banks’ IT infrastructure defences at growing risk of cyber-attack.

Read More

Road Map To A $200,000 Cybersecurity Job

Looking to get ahead in cybersecurity? Here are four areas to keep in mind as you make a five-year career plan.

Read More

Google Shines Light On Corporate Gmail Threats

New data highlights the diversity of security threats putting corporate Gmail inboxes at risk.

Read More

Businesses Fear Brand Damage More Than Security Breaches

Organizations struggling with risk management are more concerned about brand damage than cyberattacks, new Ponemon study shows.

Read More

3 Lessons From The Yahoo Breach

Your organization must address these blind spots to detect sophisticated attacks.

Read More

The Sorry State Of Cybersecurity Awareness Training

Rules aren't really rules if breaking them has no consequences.

Read More

Obama Expels 35 Russian ‘Spies’

US President Barack Obama has expelled 35 suspected Russian spies and sanctioned two intelligence services in retaliation for alleged interference in the recent presidential elections and harassment of US diplomatic personnel in Russia.

Read More

Brute-Force Botnet Attacks Now Elude Volumetric Detection

It just became harder to distinguish bot behavior from human behavior.

Read More

Survey: Majority Of Businesses Would Pay Ransomware Attackers

Nearly 70% of ransomware victims surveyed by IBM said they paid between $10K and $40K to retrieve their data.

Read More

The Coolest Hacks Of 2016

No 400-pound hacker here: Lightbulb and 'do-gooder' worms, machines replacing humans to hack other machines, and high-speed car hacking were among the most innovative white-hat hacks this year.

Read More

Phishing Services Reap Twice The Profit For Attackers

Attackers tap the cloud to reduce costs and increase efficiency of their phony and malicious emails, according to a new Imperva study.

Read More

Cybersecurity Readiness Confidence Declined In 2016

New report querying security pros shows increase in worry about risks with mobile and cloud environments.

Read More

How to build the foundation of a successful counter insider threat programme

The information security risks posed by insiders are a threat to organisations across all industry sectors and disciplines. Through access to information systems afforded by their status, insiders can cause a loss of intellectual property with damaging effects even greater than those of a large external cybersecurity breach of personally identifiable information.

Read More

18 months - enough time to re-assess your security measures?

The clock is ticking. Eighteen months may sound like a long time, but to rethink and enhance an enterprise’s security measures, it is not long at all.

Read More

What Does the Role of CISO Look Like in 2016?

The IT landscape continues to change, between the growth of the Internet of Things and the increasing frequency and complexity of cyber-threats. Technology is evolving more rapidly than before and we now have vast amounts of data at our disposal.

Read More

Thinking Ahead: Cybersecurity In The Trump Era

In a panel held by the University of California Berkeley Center for Long-Term Cybersecurity and Bipartisan Policy Center, experts discuss challenges facing the incoming presidential administration.

Read More

Learning To Trust Cloud Security

Cloud-centric computing is inevitable, so you need to face your concerns and be realistic about risks.

Read More

DTCC Survey: Cyber Threat Ranked #1 Risk To Global Financial System

Despite geopolitical uncertainties, cyber threats are the financial industry's biggest worry, new data shows.

Read More

How Businesses, Employees Can Navigate The Security Hiring Process

At Black Hat Europe 2016, security experts weigh in on how companies can build strong security teams, and how employees can educate themselves to meet business needs.

Read More

Catching Online Scammers, Dealers & Drug Dealers With DNS

Researchers at Black Hat Europe this week will demonstrate a streamlined technique for spotting and identifying illicit narcotics, counterfeiters, and other scammer websites and operations.

Read More

How To Build A Strong Security Awareness Program

To become more secure, focus your training and manage your top risks.

Read More

Adobe Rushes Out Emergency Patch For Critical Flash Player Vulnerability

Exploit, available in the wild, is being used in attacks against Windows users, company warns

Read More

5 Tips For Preventing IoT Hacks

The recent DDoS attack on Dyn was powered in part by a bot army of home devices. How not to let your webcam or other IoT system go rogue.

Read More

Smart Cities Have No Cybersecurity, Say 98% Of Government IT Pros

Tripwire research indicates smart grids and transportation among the services most exposed to cyberattack risks.

Read More

Hacking Voting Systems: A Reality Check

Can democracy be hacked? Yes, but not in the way you might think.

Read More

IoT Default Passwords: Just Don't Do It

The rise of the Internet of Things makes the use of default passwords especially perilous. There are better options.

Read More

Online Gaming Currency Funds Cybercrime In Real Life

You really needed Cristiano Ronaldo or that Doomhammer. Cybercriminals will help you get it for a price, and it's not even entirely illegal.

Read More

US Formally Accuses Russia Of Stealing DNC Emails

No word on what sanctions, if any, are coming.

Read More

Security Industry Takes Steps To Close Gender Gap

A recent surge of programs and initiatives to nurture women and girl's interests and careers in cybersecurity and technology bodes well for an industry that desperately needs to close a persistent gender gap.

Read More

Today's Cybersecurity Management Requires A New Approach

The current managed security services provider model just doesn't work in our information-rich world. Time to shake things up.

Read More

Fear & Loathing In The Cloud

Whether you've already bought your ticket for the cloud or still have some issues to sort through, fine-tune your security practices to make sure your ride is a smooth one.

Read More

5 Best Practices For Winning the IoT Security Arms Race

By focusing on a pragmatic approach to security, it's possible to develop IoT solutions that will reduce future risk without breaking the bank.

Read More

Russian 'Fancy Bear' Hackers Hit Mac OS X With New Trojan

Aerospace victim hit by targeted attack that didn't even exploit a Mac vulnerability.

Read More

Silicon Valley’s War on Disease: Zuckerberg, Microsoft, Google to End Cancer and Aging

Silicon Valley is going to war against disease, cancer, aging, and perhaps even death, with advanced computing, AI and machine learning, genomics, DNA engineering, biotech and nanotech. Tech giants and mega-rich philanthropists are spending billions to permit hacking biology all the way down to DNA, and perhaps we could see breakthroughs in only a few years.

Read More

Hacking 'Forward’ With Weaponized Intelligence

Instead of hacking back and taking the fight to your adversary, what if your organization hacked forward by unearthing breach scenarios before the hackers do?

Read More

Uber, Dropbox, Other Tech Leaders Team Up To Boost Vendor Security

Tech companies - including Uber, Dropbox, Twitter, and Docker - have joined forces to create the Vendor Security Alliance, which aims to vet vendor security practices.

Read More

20 Questions Security Leaders Need To Ask About Analytics

The game of 20 questions is a great way to separate vendors that meets your needs from those who will likely disappoint.

Read More

Israeli teenagers held over data flood internet attacks

Two Israeli teenagers have been arrested on suspicion of running a service that allowed paying customers to attack websites.

Read More

Two Men Arrested for Allegedly Hacking Senior U.S. Government Officials

ALEXANDRIA, Va. – Andrew Otto Boggs, aka “INCURSIO,” 22, of North Wilkesboro, North Carolina, and Justin Gray Liverman, aka “D3F4ULT,” 24, of Morehead City, North Carolina, were arrested today on charges related to their alleged roles in the computer hacking of several senior U.S. government officials and U.S. government computer systems.

Read More

3 Golden Rules For Managing Third-Party Security Risk

Rule 1: know where your data sets are, which vendors have access to the data, and what privacy and security measures are in place.

Read More

More Than 40% Of Attacks Abuse SSL Encryption

New report shows risk of not inspecting encrypted packets.

Read More

New York Times: Russian Intelligence Hackers Targeted Us

In a report late Tuesday, the New York Times revealed that it’s Moscow bureau was the target of a cyberattack from Russian hackers, earlier this month.

Read More

Russian Cyberspies' Leaked Hacks Could Herald New Normal

Time to set cyber espionage 'norms' before more volatile nation-states follow suit, experts say.

Read More

Anatomy Of A Social Media Attack

Finding and addressing Twitter and Facebook threats requires a thorough understanding of how they're accomplished.

Read More

Why people ignore security alerts up to 87% of the time

Developers, your security warnings are messing with people’s brains, and not in a good way.

Read More

What It Means To Be A Data Scientist

How do data scientists spend their time? What tools do they use? What degrees do they have? Check out our handy infographic to find out.

Read More

User Ed: Patching People Vs Vulns

How infosec can combine and adapt security education and security defenses to the way users actually do their jobs.

Read More

Poorly Configured DNSSEC = Potential DDoS Weapon

New research from Neustar shows how attackers could abuse DNSSEC-secured domains for distributed denial-of-service (DDoS) attacks.

Read More

Marriott, Hyatt, Starwood Hit by Major Card Data Theft

In the latest major hospitality breach, 20 hotels run by HEI Hotels and Resorts, including Hyatt, Marriott, Starwood and Intercontinental properties, have been hit with point-of-sale malware.

Read More

Google To Roll Out New Security Alerts On Gmail

Gmail users to get alerts for suspicious email senders as well as sketchy links in messages.

Read More

900 million Android devices affected by Quadrooter security flaws

All Android OS versions are susceptible and can be affected by four identified security flaws.

Read More

Cybersecurity Fears Among Consumers On The Rise

Digital Citizens Alliance poll reveals nearly half of Americans have been victims of cyber fraud.

Read More

Apple Finally Launches Bug Bounty Program

Security researchers will be eligible for bounties of up to $200,000. But for the moment the program is invite-only.

Read More

Fear of hacking: Internet-connected cars and home security video top survey

What internet-connected device do most people fear getting hacked? The majority of respondents to a just released survey from Vormetric answered: Their car and home security camera.

Read More

How to Roll Your Own Threat Intelligence Team

A lot of hard work needs to go into effectively implementing an intelligence-driven security model. It starts with five critical factors.

Read More

South Korea: Cyberattack By North Korea Exposed Data Of 10 Million Consumers

Personal data visitors to online shopping portal stolen, says South Korea police.

Read More

Hackers could access your passwords after finding LastPass security flaw

A Google Project Zero researcher claims to have found a 'critical' LastPass bug.

Read More

In Security, Know That You Know Nothing

Only when security professionals become aware of what they don't know, can they start asking the right questions and implementing the right security controls.

Read More

Building Black Hat: Locking Down One Of The World’s Biggest Security Conferences

For security pros, being asked to help secure Black Hat is like being asked to play on the Olympic basketball team.

Read More

How Apple and Facebook Helped US to Arrest Kickass Torrents’ Owner

Kickass Torrents’ owner Artem Vaulin has been arrested but the way Apple, Facebook and Coinbase helped the US authorities to track Vaulin back to Europe sounds like some script from a James Bond movie!

Read More

5 Failsafe Techniques For Interviewing Security Candidates

Filling critical information security roles with the right people is never easy. But learning how to separate the 'wheat from the chaff' is a smart step in the right direction.

Read More

Improving Attribution & Malware Identification With Machine Learning

New technique may be able to predict not only whether unfamiliar, unknown code is malicious, but also what family it is and who it came from.

Read More

Remote Systems Admin Software Rigged With Lurk Trojan

Website of legitimate and popular application used by banks in Russia and nearby nations faced successive compromises.

Read More

UK Rail Hit By Four Cyberattacks In One Year

No disruption to rail network caused, hackers appear to be nation-states, says cybersecurity firm Darktrace.

Read More

More than 60% of Europeans are eager to use biometrics for secure payments, Visa study finds

"Consumers will have an increasing number of choices in how they pay," says Visa Europe executive director Jonathan Vaux.

Read More

Chinese man to serve U.S. prison term for military hacking

A Chinese businessman who pleaded guilty in March to conspiring to hack into the computer networks of Boeing (BA.N) and other major U.S. defense contractors was sentenced on Wednesday to nearly four years in prison, prosecutors said.

Read More

What I Expect to See At Black Hat 2016: 5 Themes

Over the years, Black Hat has morphed from a little show for security researchers to a big conference that attracts everyone from black-hat hackers to C-level security execs. Here's what piques my interest this year.

Read More

SWIFT Boosts Defense Against Cyberattacks

Cyber security firms hired, intelligence team set up to ward off future attacks on banks through SWIFT.

Read More

Does Defense In Depth Still Work Against Today’s Cyber Threats?

Yes. But not for much longer unless the industry shifts to an automated security and zero trust model.

Read More

Cybercrime Now Surpasses Traditional Crime In UK

The US could be on an even worse trajectory, according to one security expert.

Read More

Hacking A Penetration Tester

How even a pen test conducted by a security pro can be hacked by a determined attacker looking for a way to its target.

Read More

Comey: No Evidence Clinton Email Server Was Hacked, But Still 'Possible'

The FBI does not recommend charges against Hillary Clinton after investigation into use of her personal email server.

Read More

Hacker Lexicon: What Is Full Disk Encryption?

There’s been a lot of talk in recent years about encryption and what the FBI terms its “Going Dark” problem—its inability to read the communications of surveillance targets because more and more data is being encrypted. And while the end-to-end messaging encryption that protects data in transit in apps like WhatsApp get a lot of press, it’s a problem that applies equally a data at rest. The kind that full-disk encryption is designed to protect.

Read More

Ukraine’s Central Bank Issued Hacking Alert In April

Country's chief financial body told lenders to strengthen security in wake of cyberattack on bank via SWIFT.

Read More

IT skills shortage leading to cybersecurity issues, research argues

If a security system flags up an issue in your organisation and nobody acts on it, is it even an issue? Many organisations are acting that way, according to a report from Skyhigh Networks and the Cloud Security Alliance (CSA).

Read More

Cisco Boosts Cloud Security Capabilities With CloudLock Buy

Network giant will purchase the Massachusetts-based provider of cloud access security broker technology for $293 million.

Read More

Apple’s Big Security Upgrades Will Save You From Yourself

During this week’s WWDC keynote, executives touted improvements to popular services like Siri, iMessage, and Apple Music. They demonstrated exciting new uses for nascent features like 3D Touch.

Read More

The Importance Of Taking A More Active Role To Protect Our Data

Big data has lots of potential to make our decisions more efficient and effective. But like any powerful substance, too much in the wrong hands can have disastrous consequences.

Read More

‘Bug Poachers:’ A New Breed of Cybercriminal

As if security researchers don't have enough to worry about, we now have to contend with extortionists who take advantage of the well-established fact that applications are a ripe target for exploitation.

Read More

5 Tips For Staying Cyber-Secure On Your Summer Vacation

Stick with mobile payment apps and carrier networks when traveling. And don't broadcast your plans or locations via social media.

Read More

White Hat Teen Hacks Pentagon Websites

A high-school student and hacker spent nearly 10-15 hours between classes hacking U.S. Department of Defense (DOD) websites, between classes. He got thanked and praised for it by the Pentagon.

Read More

How Secure is Secure? Tips For Investing In The Right Strategy

Business alignment, defense-in-depth and a phased approach are three principles to follow when building out a solid security program.

Read More

Survey Points To 75% Organizations With Poor Cybersecurity

RSA research says nearly half of surveyed companies show their incident response capabilities to be nonexistent.

Read More

Cisco Invests $10 Million To Tackle Cybersecurity Talent Gap

The company's Global Cybersecurity Scholarship program is looking to diversify the talent pool by working with veterans, women and those early in their careers.

Read More

Self-Service Password Reset & Social Engineering: A Match Made In Hell

A sad tale of how hackers compromised a CEO's corporate account by trolling Facebook and LInkedin for answers to six common authentication questions. (And how to avoid that happening to you)

Read More

IoT Security: Onus On Developers, Security Researchers

Security teams and DevOps need to team up on 'lean security' processes that make safety a top priority before a product reaches the market.

Read More

Google Dorking: Exposing The Hidden Threat

Google Dorking sounds harmless, but it can take your company down. Here's what you need to know to avoid being hacked.

Read More

Zcrypt Ransomware: Old Wine In A New Bottle

Malware authors have combined old and new approaches to try and sneak Zcrypt past defenses, Check Point says.

Read More

Top Security To-Dos For The Entertainment Industry

'The biz' has unique security needs. And it isn't only about preventing 'the next Sony.'

Read More

Ransomware Scam Profits Not As 'Glamorous' As You'd Think

Bosses typically make about $90K a year, affiliates much less, Flashpoint study finds.

Read More

5 Ways To Protect Your Network From New Graduates

Employers of new grads, this is your assigned reading: Batten down the hatches, they're coming and their security behaviors are appalling.

Read More

5 Tips For Combating Phishing

Phishing attacks are on the rise, but there are steps you can take to combat the threat.

Read More

Ultimate Guide To DDoS Protection: Strategies And Best Practices

To be in the best position to defend against DDoS, companies need to protect against a range of exploitable vulnerabilities -- and have the tools to detect and react to attacks.

Read More

Ultimate Guide To DDoS Protection: DDoS Is A Business Problem

In the first of a two-part series, we examine the impact DDoS attacks have on business continuity - and why it is so much more than a network security problem.

Read More

NTP Servers Exposed to Long-Distance Wireless Attacks

AMSTERDAM – HACK IN THE BOX – Researchers have demonstrated that remote attackers can wirelessly change the time on network time protocol (NTP) servers over long distances using inexpensive devices.

Read More

More Banks May Have Been Hacked Via SWIFT

FireEye said to investigate breaches similar to that of Bangladesh Bank, of around 12 financial institutions, mostly out of in Southeast Asia.

Read More

‘Guccifer’ Pleads Guilty To Hacking US Politicians

Romanian hacker, extradited to the US, breached emails of 100 high-profile Americans and publicized their personal information.

Read More

4 Signs Security Craves More Collaboration

New Intel Security report finds that companies look to work together across departmental lines to remediate security incidents.

Read More

Is Swift Bank Network Losing War Against Cyber Attacks?

Swift, a global money transfer network used by banks, has suffered gaps in security standards that have resulted in at least three breaches - in Vietnam, Bangladesh and Ecuador, according to The Wall Street Journal.

Read More

Why automation is the key to the future of cyber security

Examining the perceived disadvantages and the significant truths about automation’s role in cyber security

Read More

SWIFT Hack Shows Attackers Penetrating Bank Defenses

NEWS ANALYSIS: Using highly specialized malware, online thieves manipulated the international banking system and stole more than $80 million.

Read More

Looking Forward: A Skilled Security Talent Shortage Looms

The skilled security workforce crisis will continue for the foreseeable future, even as expert systems are deployed.

Read More

Survey: Customers Lose Trust In Brands After A Data Breach

Survey by FireEye highlights customer reluctance to continue with service providers with weak cybersecurity.

Read More

Defend yourself! Build a cyber security database

Attackers have all kinds of data about the threat landscape -- and about your organization, if it happens to be a target. Now's the time to arm yourself with data, too

Read More