The Hackers’ Bounty: How Much Do Cybercriminals Make From Innocent Users?

Cybercriminals could be raking in profits 20 times greater than the cost of their attacks, according to figures compiled by Kaspersky Lab experts.
Password Managers Under Attack: What’s the Business Impact?

Given recent attacks against password managers, Chris Webber of Centrify recommends businesses consider SSO and multi-factor authentication solutions.
November Patch Tuesday – Part 3

November 2014 has been an unusual month for Patch Tuesday, especially given Adobe’s second update (APSB14-26) for an Adobe Flash vulnerability.
Sony The Latest In Long String Of Extortion Attacks

The recent Sony hack shows that extortion attacks can have a devastating effect on a company, its employees, and its clients.
Cars Susceptible To Hacking Attacks

Jacques Louw of MWR Infosecurity discusses the cyber threats associated with the idea of hacking a car.
Who’s Tracking Your Smartphone And How Can You Stop Them?

An infographic reveals how retailers and other entities track your movements via your smartphone and what you can do to protect your privacy.
You Can’t Always Stop The Breach – But You Should Always Be Able To Spot It

Mark Kedgley of New Net Technologies urges us to stop pretending that current security policies can stop any breach from working its way into key systems.
Pioneering Cyber Security Document Helps Secure Human Rights Abroad

Recently, techUK published a guide for cyber security companies with actionable advice to help identify and manage the risks of exporting their products.
Stealth Mode: Lying in Wait inside the White House Network

Wallace Sann of Forescout Technologies weighs in on what federal agencies should be doing in order to avoid breaches such as the recent White House hack.
Regin: A Malicious Platform Capable Of Spying On GSM Networks

Kaspersky Lab’s Global Research and Analysis Team has published its research on Regin, one of the most sophisticated malware ever discovered.