Islamabad appears to back down over data access
Pre-packaged Russian Dating Scam Templates Revealed
Fraud-as-a-service could earn scammers $2,000 per week
Destructive BlackEnergy Attacks Blitz Ukrainian News and Energy Firms
Hacking team had a busy 2015, according to Eset
APAC Industrial Control Security Market to Top $1 Billion
New report claims firms are beginning to understand the threat to ICS
Center for Internet Security Releases Companion Guides
The CIS Controls are a recommended set of actions to stop today’s most pervasive and dangerous cybersecurity attacks.
IoT, Virtual Architecture to Dominate Cloud Security in 2016
The cloud represents several emerging attack vectors that IT departments and everyday users should be considering now.
Panda Security: New Malware Hit 230,000 Per Day in 2015
Vendor predicts JavaScript and PowerShell attacks could be on the rise
Foreign Hackers Infiltrate US Power Grid – Report
Iranian attackers stole top secret plans
US Congress Passes Controversial Info-Sharing Bill
After more than five years of debate. The Cybersecurity Act of 2015 was passed as part of the Omnibus Spending Bill.
Cyber-Bonanza: 80% of Android Users Have Outdated Smartphones
With 6,400 new instances of malware targeting Android devices every day in the third quarter, phones that aren’t updated offer a big attack vector.