According to Kaspersky Lab, spammers in September produced topical new versions of the old “Nigerian Letter” scam, spam this time based on the Ebola virus.
Browsing: CISO
Corporate boards need to get off the dime and fund their IT security departments with the tools to stop “identity,” i.e. root-based, attacks.
Veracode has released analytics from its cloud-based platform revealing the vulnerabilities created by the use of open source and third-party components.
Identity theft is a serious concern against which all online users need some kind of protection.
Allan Pratt weighs in on the benefits and risks associated with using cloud applications.
While there has been much talk about how Apple Pay might disrupt the payment system, and how easy it will be to use, its security is being overlooked.
McAfee has launched a new report predicting how the next generation of government might look and what the future security challenges might be.
More than 110 million pieces of personal information have been traded online already in 2014.
PhishMe has developed a special infographic “How to Spot a Phish” that provides a guide for recognizing the tell-tale signs of a phish.
226 million personal records have been compromised in Europe as a result of privacy data breaches in the past decade.