Eset report finds Russians least likely to use security software.
Crypto Reuse Opens Up Millions of Connected Devices to Attack
Impersonation, man-in-the-middle or passive decryption attacks could allow access to administrator credentials and sensitive info.
Industrial Control Systems Vulnerable to Shellshock, Heartbleed
Advantech industrial control systems that are used to power utilities and critical infrastructure networks are wide open to several known flaws.
Security Placing Too Much Focus on Technology and Reliance on IT Departments
Human error and ignorance among workforce are presenting enormous gaps in fortification
BlackBerry to Quit Pakistan after Backdoor Access Demands
Authorities wanted ‘unfettered access’ to BES servers, firm claims.
Global Police Join Up to Take Down Counterfeit Sites
A whopping 37,000 sites are now offline.
Woman Gave £1.6 Million to Dating Site Scammers
Met police warn netizens to be vigilant online.
Data Breach Trends to Evolve in 2016
For one, Experian predicts that consumers and businesses will be collateral damage in cyber-conflicts among countries.
A Third of Businesses Use Online Banking
The growing use of mobile devices for corporate banking could put company funds at risk.
Hello world!
Welcome to WordPress. This is your first post. Edit or delete it, then start writing!