Fortinet is adding Cisco, HPE and Nokia to its stable of partners whose security gear can share information with Fortinet products to improve overall security.
Stories by Tim Greene
A $1 billion Russia-based criminal gang has been bilking online advertisers by impersonating high-profile Web sites like ESPN, Vogue, CBS Sports, Fox News and the Huffington Post and selling phony ad slots, but that’s about to end.
Security pros need to pay attention to malicious activities that don’t rely on actual malware to succeed, according to a study by Carbon Black.
Adultery dating service submits to 20 years of federal auditing of its information security.
Cyber incidents dominated headlines this year, from Russia’s hacking of Democrat emails to internet cameras and DVRs launching DDoS attacks, leaving the impression among many that nothing should be entrusted to the internet.
As some of the tech sector’s heaviest hitters prep for a meeting this week with president-elect Donald Trump, they need to make sure they get answers to critical questions about issues that could affect not only their businesses but the U.S. economy in general.
Donald Trump’s effect on cybersecurity after he’s sworn in as president will likely be toward military uses of cyber weapons and stronger tools for law enforcement to crack encryption, but the impact is hard to predict due to the vagueness of his proposals so far.
12 cyber shopping tips because criminals will be using all the attacks they can this holiday season in order to score cash and gather valuable personal data that they can monetize later.
Hackers are writing apps, setting up phony Wi-Fi networks and unleashing malware in attempts to turn legitimate Black Friday and Cyber Monday retailing into profits for themselves, according to security experts.
Attackers who were trying to turn the Ask.com Toolbar into a malware dispensary got caught early on when their scheme was picked up by security services that were looking for anomalies.
IBM Security has launched a network-emulation environment where corporate teams can play out attack scenarios so they are better prepared for incidents they might face in the real world.
The annual holiday uptick in denial of service attacks will likely continue this year only this time with a new devastating weapon: Internet of Things (IoT) devices, according to Akamai.
Filling cybersecurity jobs is getting so hard managers need to think outside the box if they hope to fill critical positions.
The Internet of things (IoT) has already been used to launch the biggest DDoS attacks ever, but now it represents a potential path for attackers to compromise cell phones.
ExtraHop is introducing a way to capture files just before ransomware encrypts them, making it possible to restore them but without regularly scheduled comprehensive updates.