Recent Features

Look beyond BYOD

Whether officially permitted or not, employees are using personally-owned smart phones, tablets, and PCs for work. A study by Gartner last year found that 57% ...

Rapid Cybersecurity Risk Assessments

Businesses and governments alike are struggling to effectively protect information systems from cyber-attack. The theory appears sound: We conduct risks assessment, identify areas of risk ...

Apple releases iOS 7.1 to address multiple security issues

On Monday Apple released iOS 7.1 to address a number of security issues. The update is now available through iTunes and Software Update on iOS devices. ...

C-13: Who’s the bully?

Bill C-13 is being promoted by the Conservatives as addressing cyber-bulling, but it is much more about the Harper government bullying Canadians into giving up ...

Adobe Releases Security Update for Adobe Shockwave Player

Adobe has released a security update to address a vulnerability in Adobe Shockwave Player 12.0.7.148 and earlier versions for Windows and Macintosh operating systems.

All featured articles »

Latest Cybersecurity News

Most but not all sites have fixed Heartbleed flaw

The world’s top 1,000 websites have been patched to protect their servers against the “Heartbleed” exploit, but up to 2% of the top million were ...

Thornton May: Your privacy map is probably wrong

The privacy maps being created today are primarily designed to avoid lawsuits.

USA world rankings: #1 for sending spam, #8 for Netflix streaming speeds

The U.S. is top dog when it comes to sending spam, but when it comes to streaming Netflix, the U.S. comes in as the eighth ...

Easy-to-Use NTP Amplification Emerges as Common DDoS Attack Vector

Reflection attacks using the Network Time Protocol surge in the first quarter, as attackers shift to bandwidth-clogging floods of data.

Amplification, reflection DDoS attacks increase 35 percent in Q1 2014

The Q1 2014 Global DDoS Attack Report reveals that amplification and reflection distributed denial-of-service attacks are on the rise.

Bill would restrict Calif. retailers from storing certain payment data

The bill would ban businesses from storing sensitive payment data, for any long than required, even if it is encrypted.

Security Manager’s Journal: Virtual machines, real mess

When Internet and phone service are impaired at a development center, the problem is traced to VM images installed in a classroom.

An Allegation of Harm

In December 2013, an executive from big-three credit reporting bureau Experian told Congress that the company was not aware of any consumers who had been ...

Heartbleed SSL Flaw’s True Cost Will Take Time to Tally

NEWS ANALYSIS: Privacy, bandwidth and money have all been lost due to the Heartbleed bug. The full implications are, as yet, unknown.

3 privacy violations you shouldn’t worry about

There are many major threats to our privacy that we should be up in arms about, but iBeacons, Gmail scanning and Google Glass are not ...

Attackers target Facebook to deliver Android iBanking malware

A Windows trojan delivered via drive-by download is injecting malicious content into Facebook and ultimately fooling users into downloading Android malware that can allow for ...

Investors aim to ‘save’ bitcoin exchange Mt. Gox

After suffering a massive bitcoin theft, the exchange faces liquidation of its assets in Japan.

More Cybersecurity News