50% surge in encrypted traffic

Exploit kits evolved with alarming speed, heightened stealth and novel shape-shifting abilities.

Read More

Gemalto releases findings of 2015 Breach Level Index

Theft of identities and personal information retains top spot, accounting for 53% of data breaches; healthcare and government overtake retail as most-targeted sectors.

Read More

prpl Foundation demonstrates security by separation for IoT and other connected embedded devices

The prpl Foundation is demonstrating how an open, hardware based approach provides an ideal foundation for securing Internet of Things (IoT) and other connected embedded devices.

Read More

Gemalto launches M2M Cat 1 LTE module

Gemalto is launching a leading edge M2M Category 1 (Cat 1) LTE wireless module. This advanced module enables fall-back to 2G in Europe Middle East Africa and to 3G in North America for areas where LTE connectivity is not yet fully available.

Read More

NEWS

Social engineering leads the list of most popular hacking methods

The recent data breach of 10,000+ Departments of Justice and Homeland Security staff and over 20,000 supposed Federal Bureau of Investigation (FBI) employees is another example that becoming an insider by using social engineering tactics is much easier for hackers than writing zero-day exploits.

Read More

IT professionals overconfident in cyber attack detection

Industry leader evaluates confidence in seven key security controls required to detect cyber attacks on endpoints.

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more
Nessus vulnerability, configuration, and patch assessment solution now available for AWS customers.
SafeNet, Inc. has announced key enhancements to SafeNet ProtectV that allow customers to encrypt...
Hackers exploit lack of IT investment to target scientific, medical, economic and defence research.
The integrated infrastructure and platforms market in Europe, the Middle East, and Africa (EMEA)...
Yahoo! hat seine Nutzer angewiesen, ihre Passwörter zu ändern, nachdem es durch eine...
OpenText has issued the 2020 Webroot Threat Report, highlighting not only the agility and...