22% of Global Websites Found to Contain up to 407 Vulnerabilities Each

22% of Global Websites Found to Contain up to 407 Vulnerabilities Each

Bkav has conducted a study on websites located in 24 countries

DHS Official Says Obamacare Website Has Been Targeted by Hackers 16 Times

DHS Official Says Obamacare Website Has Been Targeted by Hackers 16 Times

The number likely only represents attempts that might have put data at risk

Watch Episode 7 of Trend Micro’s 2020

Watch Episode 7 of Trend Micro’s 2020

Will the hacktivist take the fall for the attack on The Switch?

Verizon Appoints Eddie Swartz as VP of Global Security Solutions

Verizon Appoints Eddie Swartz as VP of Global Security Solutions

He will oversee the team that makes the data breach investigations reports

Waking Shark II: British Banks Take Part in Cyber Security Exercise <em>Reuters</em>

Waking Shark II: British Banks Take Part in Cyber Security Exercise Reuters

The results of the drill will be made available in early 2014

RSA’s Ann Johnson Joins Qualys as President and COO

RSA’s Ann Johnson Joins Qualys as President and COO

She will start working at Qualys beginning November 25

ENISA and Interpol Sign World Economic Forum Principles on Cyber Resilience

ENISA and Interpol Sign World Economic Forum Principles on Cyber Resilience

The ceremony took place at The Grand Conference 2013

PCI DSS and PA-DSS 3.0 Published by PCI Council

PCI DSS and PA-DSS 3.0 Published by PCI Council

Here's an infographic that summarizes the changes in the latest version

Experts Find DOS Tool Designed to Take Down Obamacare Website

Experts Find DOS Tool Designed to Take Down Obamacare Website

It's unlikely that the app written in Delphi is capable of the task

Watch Episode 6 of Trend Micro’s 2020

Watch Episode 6 of Trend Micro’s 2020

Find out how the cybercriminals gained access to The Switch with the aid of a hacktivist

FishNet Security Acquires TorreyPoint

FishNet Security Acquires TorreyPoint

The financial terms of the deal have not been disclosed

ENISA Makes Recommendations on Using Cryptography to Protect Personal Data

ENISA Makes Recommendations on Using Cryptography to Protect Personal Data

Two studies addressed to system developers and maintenance engineers

Iranian Defense Minister Concerned About Cyberattacks on Industrial Systems

Iranian Defense Minister Concerned About Cyberattacks on Industrial Systems

Several cyberattacks have been launched against Iran over the past period

Vessel Hacking Techniques Put into Practice by Iranian Tanker

Vessel Hacking Techniques Put into Practice by Iranian Tanker

An Iranian ship disguised itself as a much smaller vessel

Sophos Updates Threatsaurus with Simplified Definitions and New Tips

Sophos Updates Threatsaurus with Simplified Definitions and New Tips

The latest release is a result of a partnership with the Center for Internet and Security

Study: Women Are the Key to the Growth of the Security Industry

Study: Women Are the Key to the Growth of the Security Industry

Unlike men, women believe tech skills are not enough to be a successful IT security pro

RandomStorm Enhances Network Intrusion Detection System StormProbe

RandomStorm Enhances Network Intrusion Detection System StormProbe

The appliance analyzes all network traffic in search for threats

 
Want more? Browse: