The Latest News

  • In Britain, Malware No. 1 Cyberthreat

    Zeus Banking Trojan Threats Still Dominate, CERT-UK Warns In Britain, Malware No. 1 Cyberthreat

    Britain's computer emergency response team - CERT-UK - reports that malware remains the dominant mode of online attack for cybercriminals, and Zeus their most preferred tool of choice. But the team is promoting a free information-alert service to help. Read more...

  • UK Quietly Rewrote Hacking Law

    Prosecution Exemption Now Applies to Police, Spies UK Quietly Rewrote Hacking Law

    The British government rewrote the country's computer abuse law in March to shield law enforcement and intelligence agencies from being prosecuted for hacking. The move, which just came to light, appears to have been driven by a legal claim. Read more...

  • Crime: Why So Much Is Cyber-Enabled

    Insights on 21st Century Crime-Fighting Techniques Crime: Why So Much Is Cyber-Enabled
    Raj Samani of Intel Security

    Much of today's crime is "cyber-enabled," warns cybercrime expert Raj Samani, and successfully blocking such attacks increasingly demands not just better technology and public-private collaboration, but also an understanding of psychology. Read more...

  • UK Elections: Privacy, Security Impacts

    As Tories Take Majority, Experts Detail Expected Policies UK Elections: Privacy, Security Impacts
    Prime Minister David Cameron

    Britain's Tory party has secured a majority in Parliament, which means the country will soon see a new legislative agenda. Here are some of the information security, privacy and surveillance initiatives to expect in the coming months. Read more...

  • Europe: Data Breach Problem Unknown

    Brian Honan Details EU Breach Information Deficit Europe: Data Breach Problem Unknown

    Europe does not know the true extent of its data breach problem, says Europol advisor Brian Honan, owing to the lack of a U.S.-style breach notification law to alert European consumers when their data has been stolen or exposed. Read more...

  • Article

    PCI: 5 New Security Requirements

    New Task Force Created to Assist Smaller Merchants By Tracy Kitten
    PCI: 5 New Security Requirements

    Five best practices noted in version 3.0 of the PCI Data Security Standard will become requirements after June 30, with remote access and third-party risks the key focus - particularly for smaller merchants.

  • Interview

    Warning: Security Alert Overload

    Expert Says Warnings and Alert Messages Are Failing Us By Mathew J. Schwartz
    Warning: Security Alert Overload

    Vendors' and software makers' over-reliance on security messages and warnings has left users habituated to them, thus rendering such alerts less effective or even worthless, warns cybersecurity expert Alan Woodward.

  • Blog

    Hot Sessions at Infosec Europe 2015

    Cybercrime, Data Breaches Among Topics at Must-See Sessions By Mathew Schwartz
    Hot Sessions at Infosec Europe 2015

    This year's Infosecurity Europe conference in London is offering a top-notch range of sessions, ranging from how to battle cybercrime and social engineering to building a better security culture and workforce. Here's my list of must-see sessions.

  • Blog

    The Internet of Buggy Things

    It's Time to Patch or Pitch Vulnerable Devices By Mathew Schwartz
    The Internet of Buggy Things

    It's no surprise that virus-wielding hackers are exploiting Internet of Things devices. Blame too many device manufacturers rushing products to market, skimping on secure development practices and failing to audit the third-party code they use.

  • Article

    Logjam Vulnerability: 5 Key Issues

    Don't Rush to Fix 20-Year-Old Flaw, Experts Say By Mathew J. Schwartz
    Logjam Vulnerability: 5 Key Issues

    While the "Logjam" vulnerability raises serious concerns, there's no need to rush related patches into place, according to several information security experts. Learn the key issues, and how organizations must respond

More news...

Webinars

  • PREMIUM MEMBER EXCLUSIVE

    Mobile Fraud

    Mobile banking is growing out of its infancy and experts predict it will soon be the dominant banking and payments channel. With the vast array of endpoints being utilized, how are the threats of...

  • PREMIUM MEMBER EXCLUSIVE

    Consumer Fraud Awareness: What's Working, What's Not & What's Next?

    With social engineering, phishing and a host of other attacks on the rise, the consumer remains the most vulnerable link in the fraud chain. Banks and financial institutions are helping to lead the...

More webinars...

White Papers

More whitepapers...
ARTICLE Cybersecurity's Growing Pains

The future of cybersecurity may be full of surprises. But these twists will cause a big sensation,...

Latest Tweets and Mentions

ARTICLE Cybersecurity's Growing Pains

The future of cybersecurity may be full of surprises. But these twists will cause a big sensation,...

The ISMG Network