Please turn on your JavaScript for this page to function normally.
What people think about passwords, email snooping and personal data

At the RSA Conference in San Francisco, Fortinet published new research that shows where Millennials and Gen-Xers stand in regards to passwords, online marketing practices, …

The time for responsible reporting has come

The beginning of the year is when budgets for the forthcoming year are made available, when many new projects are teed off, and the security conference season starts. It is …

Password Manager Pro gets SAML 2.0 support

ManageEngine has added SAML 2.0 support to Password Manager Pro. The move strengthens the user authentication mechanism in Password Manager Pro, enabling integration with …

Week in review: Flash, IE 0-days exploited in the wild, vulnerable routers, and the new issue of (IN)SECURE Magazine

Here’s an overview of some of last week’s most interesting news, reviews, articles and interviews: (IN)SECURE Magazine issue 41 released (IN)SECURE Magazine is a …

Qualys CEO to deliver keynote at RSA Conference 2014

Qualys chairman and CEO Philippe Courtot will deliver a keynote speech at the upcoming RSA Conference 2014 on Thursday, February 27 at 3:30 p.m. PT. Security professionals in …

Security vulnerabilities found in 80% of best-selling SOHO wireless routers

Tripwire has analyzed the security provided by the most popular wireless routers used in many small and home offices and found that 80 percent of Amazon’s top 25 …

The growth and complexity of mobile threats

As employees continue to use their own devices and personal applications for work purposes, more threats are introduced into the workplace, putting company networks at risk. …

Adobe fixes Flash 0-day

Adobe released their second out-of-band update for Adobe Flash this month. APSB14-07 fixes three vulnerabilities in Adobe Flash, including CVE-2014-0502 which is being used in …

Despite costs, organizations overlook new threats

A new generation of unknown security threats stemming from megatrends and technologies like BYOD, mobility, cloud computing, and Internet usage, as well as internal actions …

Mobile threats around the world

2013 was a year of change in the world of mobile threats. Campaigns became increasingly targeted as criminals adapted their practices to maximize profit and operate under the …

Major vulnerability in Tinder dating app allowed user tracking

Include Security unveiled new research showing that users of the popular online dating app Tinder were at significant risk due to a vulnerability they discovered in the …

96 percent of apps have security vulnerabilities

Improvements in patch deployment and secure coding practices have made a slight impact on the incidence of vulnerabilities, according to a new Cenzic report. However, the …

Don't miss

Cybersecurity news