Security News
![Main sources of data breaches: Phishing, RAM scrapers, web app insecurity (Help Net Security)](/static/build/img/news/alt/Data-Cybersecurity-Predictions-2-small.jpg)
US telecom giant Verizon has published its 2015 Data Breach Investigations Report, which is based on an analysis of nearly 80,000 security incidents, including more than 2,100 confirmed data breaches,...
![Nokia in advanced talks to buy Alcatel-Lucent (Yahoo Security)](/static/build/img/news/alt/cybersecurity-attacker-small.jpg)
![Google Malaysia service disrupted by hackers (Yahoo Security)](/static/build/img/news/alt/managed-security-small.jpg)
![Attackers use deceptive tactics to dominate corporate networks (Help Net Security)](/static/build/img/news/alt/hackers-statistics-small.jpg)
Cyber attackers are infiltrating networks and evading detection by hijacking the infrastructure of major corporations and using it against them, according to Symantec. “Attackers don’t need to br...
![The key challenges to timely incident response (Help Net Security)](/static/build/img/news/alt/cybersecurity-breach-statistics-small.jpg)
Security professionals are inundated with security incidents, averaging 78 investigations per organization in the last year, with 28 percent of those incidents involving targeted attacks – one of the ...
![A look at emergent threats and their influence (Help Net Security)](/static/build/img/news/alt/cyberattack-statistics-1-small.jpg)
Analyzing Dell data sources and the 2014 threat landscape, their new report found a surge in point-of-sale (POS) malware, increased malware traffic within encrypted (https) web protocols, as well as t...
![Cloud security: CA conducts advanced research (Help Net Security)](/static/build/img/news/alt/Data-Cybersecurity-Predictions-small.jpg)
CA Labs is conducting research and development for innovative solutions to address security challenges in multi-cloud environments. Horizon 2020 awarded a contract to the consortium to conduct the res...
![CoinVault ransomware: Retrieve data without paying the criminals (Help Net Security)](/static/build/img/news/alt/ransomware-stats-small.jpg)
Victims of the CoinVault ransomware have a chance to retrieve their data without having to pay the criminals, thanks to a repository of decryption keys and a decryption application made available onli...
![Spanish election site in security cert warning screwup snafu (The Register)](/static/build/img/news/alt/hackers-statistics-small.jpg)
![How big a problem is Cloud security? (The Register)](/static/build/img/news/alt/Data-Cybersecurity-Predictions-2-small.jpg)