New report claims firms are beginning to understand the threat to ICS
Center for Internet Security Releases Companion Guides
The CIS Controls are a recommended set of actions to stop today’s most pervasive and dangerous cybersecurity attacks.
IoT, Virtual Architecture to Dominate Cloud Security in 2016
The cloud represents several emerging attack vectors that IT departments and everyday users should be considering now.
Panda Security: New Malware Hit 230,000 Per Day in 2015
Vendor predicts JavaScript and PowerShell attacks could be on the rise
Foreign Hackers Infiltrate US Power Grid – Report
Iranian attackers stole top secret plans
US Congress Passes Controversial Info-Sharing Bill
After more than five years of debate. The Cybersecurity Act of 2015 was passed as part of the Omnibus Spending Bill.
Cyber-Bonanza: 80% of Android Users Have Outdated Smartphones
With 6,400 new instances of malware targeting Android devices every day in the third quarter, phones that aren’t updated offer a big attack vector.
Hello Kitty, Goodbye Privacy as 3M+ Users Hit by Breach
Another MongoDB issue leads to exposure of personal data online
Facebook Shuns Buggy Flash in Favor of HTML5
Changes shipped to all browsers by default
Sophos Boosts Endpoint Protection Suite with SurfRight Acquisition
Sophos has acquired SurfRight to add behavioural analytic capabilities to its endpoint protection suite.