Please turn on your JavaScript for this page to function normally.
The complexity of Android malware is increasing

259 new mobile threat families and variants of existing families were discovered by F-Secure Labs in the third quarter of 2013, according to the a new mobile threat report for …

Malware analysts regularly investigate undisclosed data breaches

ThreatTrack Security published a study that reveals mounting cybersecurity challenges within U.S. enterprises. Nearly 6 in 10 malware analysts reported they have investigated …

7 must-have technical security controls for any budget

Prioritizing items on a security budget can be difficult. Here’s seven key technical controls every IT shop should include in a security budget. 1. Perimeters defenses …

Week in review: TrueCrypt’s public security audit, new MS 0-day exploited, new bug bounty programs

Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: ENISA issues recommendations for securing data using cryptography …

Inkblots could solve problem of compromised passwords

Carnegie Mellon University computer scientists have developed a new password system that incorporates inkblots to provide an extra measure of protection when, as so often …

IETF to improve the security of Internet protocols

Internet security has been a focus this week for the more than 1100 engineers and technologists from around the world gathered at the 88th meeting of the Internet Engineering …

Upcoming Patch Tuesday to bring both relief and frustration

The November Patch Tuesday Advance Bulletin is out and I think everyone is breathing a sigh of both relief and frustration. Relief because for the first time in a few months, …

European NSA is not a solution

The European Parliament should use its powers to reconsider EU-US data transfer deals and push for the creation of a European privacy cloud, EU-level protection for …

Fear of attacks leads to highly emotional decision making

Recent publicity about cyberattacks and data security breaches has increased IT risk awareness among CIOs, CISOs and senior business executives. However, Gartner’s 2013 …

Mikko Hypponen: How the NSA betrayed the world’s trust

Recent events have highlighted, underlined and bolded the fact that the United States is performing blanket surveillance on any foreigner whose data passes through an American …

HyTrust acquires HighCloud Security

HyTrust has acquired HighCloud Security, a provider of cloud encryption and key management software. By combining HyTrust’s administrative visibility and control with …

GFI MAX Mobile Device Management launched

GFI MAX announced GFI MAX Mobile Device Management (MDM), a new offering for managed services providers looking to create new revenue opportunities as increasing numbers of …

Don't miss

Cybersecurity news