Please turn on your JavaScript for this page to function normally.
(IN)SECURE Magazine Infosecurity Europe special issue released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. This year’s Infosecurity Europe conference and …

Consumers have little security concern with BYOD

Despite the rise in the use of personal devices for business use, U.S. consumers are showing scant concern for security when it comes to BYOD. According to a recent survey by …

Mac adware removal tool

Bitdefender has released the Bitdefender Adware Removal Tool to remove adware such as Genieo that can alter users’ search results, inject ads and monitor visited web …

NIST’s cryptographic material under review

The National Institute of Standards and Technology (NIST) announced that its primary advisory committee, the Visiting Committee on Advanced Technology (VCAT), has begun its …

Online on-demand web penetration testing service

High-Tech Bridge announced the general availability of ImmuniWeb – its web application and website security testing SaaS that enables anyone, regardless of company size, …

SanDisk unveils security-certified self-encrypting X300s SSD

SanDisk unveiled the company’s first, self-encrypting solid state drive (SSD) – the SanDisk X300s SSD. Leveraging TCG Opal 2.0 and Microsoft Encrypted Hard Drive …

Cybercriminals targeting unlikely sources to carry out high-profile exploits

Cybercriminals continuously discover more ways to successfully target new outlets for financial theft, according to Trend Micro. Greed is motivating cybercriminals to take a …

LanGuard 2014 R2 comes with enhanced vulnerability assessment, patch management

GFI Software released GFI LanGuard 2014 R2, the latest version of the company’s comprehensive network vulnerability scanning and patch management solution. This next …

Average enterprise generates 10,000 security events daily

Damballa released its Q1 2014 State of Infections Report, compiled from analysis of 50% of North American ISP Internet traffic and 33% of mobile traffic, plus large volumes of …

Arrests in international voice-phishing case

Belgian and Dutch judicial and law enforcement authorities, supported by the European Cybercrime Centre (EC3) at Europol and Eurojust, have concluded an operation resulting in …

NIST guidelines help developers build security in from the start

A new initiative by computer security experts at the National Institute of Standards and Technology (NIST) seeks to bring widely recognized systems and software engineering …

The evolution of an Iranian hacker group

Iran-based hacker groups have traditionally concentrated more on website defacement and DDoS attacks aimed at making a political statement, but as time passes, some of those …

Don't miss

Cybersecurity news