- This Tinder scam promises to verify your account, but actually sells porn
- A hackable election: 5 things you need to know about e-voting machines
- Researchers release free decryption tools for PowerWare and Bart ransomware
- Latest massive DDoS attack suggests criminals are plotting long campaigns
- Flash Player to be off by default in Firefox in 2017
News, Features, and Interviews
Tinder users beware. The popular dating app generally doesn’t verify user accounts, but that hasn’t stopped spammers from pretending to offer the service.
As the U.S. heads toward a contentious national election in November, 15 states are are still clinging to outdated electronic voting machines that don't support paper printouts used to audit their internal vote counts.
Security researchers have released tools this week that could help users recover files encrypted by two relatively new ransomware threats: Bart and PowerWare.
It turns out a couple purchases on iTunes helped bring down the mastermind behind KickassTorrents, a popular file-sharing site.
NSA whistleblower Edward Snowden has come up with a concept iPhone case that can help prevent the government from finding your location.
Dell has patched several critical flaws in its central management system for SonicWALL enterprise security appliances, such as firewalls and VPN gateways.
Seventeen high-risk vulnerabilities out of the 276 flaws fixed by Oracle Tuesday also affect products from third-party software vendors, including Microsoft.
Over 11,000 people have signed a petition asking Apple not to deploy technology that would allow third parties like the police to use it to disable cameras on user phones under certain circumstances.
The U.S. has seized domains belonging to KickassTorrents, one of the most popular sites for illegal file sharing, and its alleged owner has been arrested.
The Olympics in Rio de Janeiro will attract more than just athletes and tourists this year -- hackers from across the world will also be on the prowl, trying to exploit the international event.
New ‘smart’ tokens and risk-based factors deliver tighter security, but setups remain complex and user interfaces need a facelift.
- Join ME Bank, Deutsche Bank and Proofpoint (USA) speakers for a discussion on banking trojans. Register now
- The Future is Encrypted. Manage It.
- Caution: That SSL Blind Spot is Growing
- Start your cloud journey. Register now and learn a wide range of AWS cloud solutions covered in the monthly AWS Webinar Series.
- New Destination Gigamon Security Resources IS HERE
- As networks evolve, visibility remains key to managing IT-security risk in business terms
- AISA 2016 | Hear from Bruce Schneier, David Lacey, Rik Ferguson and many more | 18-20th October Register Today
- Hear from International Tom Corn on the future of security virtualisation | 28th July 2016 Victoria
- Ransomware explosion is the latest security wakeup call for CxOs
- Next-generation SIEM turns low-level security monitoring for high-level business goals
- Michelle Rowland to lead broadband fight for Labor
- Consumer Office 365 subscription growth slows
- Why an Verizon and Yahoo merger would be like Microsoft snapping up CompuServe
- Columbus, Ohio focuses $40M DOT prize on transportation tech
- Microsoft touts data harvesting tool as aid to enterprises upgrading to Windows 10
- What customer-facing innovation looks like at Neiman Marcus
- NAB restructures, brings in three chief customer officer roles
- Making the tactile experience digital at T2
- How Mecca’s user-generated content strategy drives customer engagement
- Updated: Teradata's marketing applications business to be split into two