Please turn on your JavaScript for this page to function normally.
Life after TrueCrypt

While speculation continues around the fate of popular disk encryption software TrueCrypt, Sophos conducted a survey of over 100 IT professionals regarding their use of …

Top 10 most trustworthy online retailers

The Online Trust Alliance (OTA) announced today the results of its 2014 Online Trust Audit. Out of nearly 800 top consumer websites evaluated, 30.2 percent made the Honor …

GFI Cloud gets remote control and screen sharing

GFI Software announced the addition of remote control and remote access capabilities as part of a major update to GFI Cloud, the company’s IT platform for SMBs. GFI …

Google End-to-End: The encryption silver bullet?

The world seems to be turning its attention to the notion of data encryption, and Google is the latest to jump on the bandwagon. On June 3rd, Google announced that it would be …

Is your data already out there?

CIOs cannot underestimate the creativity of online organized criminals to quietly penetrate their IT systems through a growing area of vulnerability: employees and vendors, …

Mobile apps will have a significant impact on information infrastructure

With digital business blurring the line between the physical and the digital worlds, consumer-centric mobile apps are playing an important role, according to Gartner. Gartner …

World Cup 2014 fans are not the only ones with their eye on the ball

The World Cup 2014 championship has begun and like most major sports events, employees are browsing websites to check the latest scores, watch streaming live games and chat …

Microsoft delivers seven advisories

Patch Tuesday, June 2014 delivers seven advisories, of them, two critical, five important – one of which is the seldom seen “tampering” type. The remarkable …

1Password 4 for Android released

AgileBits has released 1Password 4 for Android, a pixel-to-bit reinvention of its industry-commanding password manager and secure wallet for Android phones and tablets. As a …

Security at higher education institutions

SANS announces results of its inaugural survey of security in institutions of higher education, in which nearly 300 higher education IT professionals answered questions about …

Retail breaches and the SQL injection threat

Continuous monitoring of database networks is the best approach to avoid breaches such as the high-profile attacks against major U.S. retailers, according to a Ponemon …

World Cup Brazil 2014: How cybercriminals are looking to score

Starting this week, 32 national teams and thousands of football fans will descend on Brazil for the 2014 FIFA World Cup. Right now the teams are fine-tuning their strategies …

Don't miss

Cybersecurity news