Please turn on your JavaScript for this page to function normally.
Top vertical industry predictions for IT organizations for 2014

Gartner has revealed its top industry predictions for IT organizations and users for 2014 and beyond. Most industries are facing accelerating pressure for fundamental …

Social identity theft protection

Riskive unveiled FriendGuard, a free app that leverages advanced math and science to protect individuals and families against social identity theft and malware attacking their …

Barracuda unveils new firewall models

Barracuda Networks announced five new models of the Barracuda NG Firewall F600, which feature multiple port options and hot-swappable power supplies to accommodate varying …

Fraudware virus targeting Android users in China and South East Asia

NQ Mobile has identified, “Copycat App,” a new fraudware virus threat targeting Android users in China and several countries in South East Asia. “Copycat …

WordPress security threats, protection tips and tricks

Robert Abela is a WordPress Security Professional and founder of WP White Security. In this interview he talks about the main WordPress security risks, offers tips for website …

Video: Antivirus evasion techniques

This video from DerbyCon discusses the basics of the AV evasion problem, what techniques work, which ones don’t and why. The talk has a particular focus on AV evasion as …

CipherCloud delivers searchable strong encryption

CipherCloud has delivered techniques to improve the searchability, usability and security of cloud data protected with AES 256-bit encryption. The solution also enables …

Real-time operational risk and compliance monitoring

Corvil announced a real-time general purpose risk and compliance monitoring solution for all kinds of electronic trading businesses. The solution monitors and captures all …

Video: DIY Command & Control for fun and no profit

Many security professionals have heard about Command & Control botnets, even more have been infected by them. Very few have had the opportunity to actually look inside …

Best practices for threat management

With threats of all types on the rise and increasing costs of security breaches growing (analyst approximate $840,000 per breach), enterprises are investing in numerous threat …

Internet sites “fingerprint” users by secretly collecting browser info

A group of European researchers have released the results of their research into just how many of the most visited Internet websites track users without their knowledge with …

Week in review: Dangerous vBulletin exploit in the wild, Blackhole exploit kit creator arrested

Here’s an overview of some of last week’s most interesting news, videos, interviews and articles: How to establish trust in the cloud In order to enforce corporate …

Don't miss

Cybersecurity news