Security News

The Marsh/Microsoft 2019 Global Risk Perception Survey is a follow-on to a similar survey published in February 2018 (conducted in 2017). SecurityWeek criticized the earlier survey results for not...

Network Traffic Analysis has been rapidly evolving to counter the increased sophistication of threats experienced by organizations worldwide. Test methodologies and tools are not yet available...

DEF CON Voting Village Study Highlights Security Loopholes in Voting MachinesU.S. voting machines remain susceptible to tampering, hacking and security vulnerabilities despite warnings from...


Beijing on Friday rejected an AFP report that Chinese hackers were suspected of being behind a series of cyber attacks on European aerospace giant Airbus. read more

Nearly two-thirds of organizations that currently use cloud also leverage some level of managed services; with 71% of large enterprise IT pros revealing that managed services will be a better use...

Researchers Find That State-Sponsored Cyberespionage Groups Seldom Share CodeAPT groups that are backed by the Russian government rarely share code with each other, fostering a competitive...

Corporations Received 'National Security Letters' Demanding InformationThe FBI has issued hundreds of subpoenas to major banks, the big three credit rating agencies and other corporations as part...

Researchers Say Widespread Web-Skimming Attacks Spawn Secondary Cybercrime MarketDecommissioned domains that were part of the pervasive Magecart web-skimming campaigns are being put to use by...

It's not just China: at least 75 out of 176 countries globally are actively using AI technologies for surveillance purposes, research shows.