Attackers are taking advantage of old vulnerabilities

FortiGuard Labs observed a 30 percent increase in mobile malware in the labs over the last six months.
Cisco Finds Younger Executives Driving Video Communications

The young workers raised on technology who came into the marketplace less than a decade ago are beginning to move up the corporate management ladder
‘Wi-Fi Pineapple’ Allows Covert Penetration Tests

Many good open-source software tools are freely available for penetration testers (and hackers) for testing the security of Wi-Fi networks and their users.
Car hacking code released at Defcon

You may hate parallel parking, but you’re going to hate it even more when somebody commandeers control of your car with you in it.
Free the User | Contain the Threat – Invincea Webinar

Free the User | Contain the Threat – Invincea Webinar on Friday, August 9th, 2013 at 2:00 PM EDT
Criminal Minds: Thinking Like a Hacker Makes Good Data Governance Sense

What can you learn from reading the exploits of the most successful hacking ring ever brought to justice? Recently, the US Attorney’s Office in NJ unsealed their indictment against a mostly Russian
India ranks second in Facebook’s $1M bug bounty

Facebook says it paid more than US$1 million to researchers who report bugs on its website, with India ranked second in terms of the number of bug bounty recipients.
Researchers Expose Industrial Infrastructure Sabotage Risk

Industrial control infrastructure that is used to monitor and manage devices and sensors can be remotely exploited, potentially leading to a cataclysmic failure
UKFraud calls for pre-emptive data management collaboration to combat insurance fraud and money laundering

Leading UK Fraud prevention consultancy and analyst UKFraud is calling on the insurance industry to accelerate activity in its management of fraud and fraudsters.
Organizations can build a stronger DDoS defense using real-time data analysis

Prolexic, the global leader in Distributed Denial of Service (DDoS) protection services has released recommendations on using real-time analytics as a powerful tool for identifying denial of service attacks and other cyber threats, risks and events.