Please turn on your JavaScript for this page to function normally.
Video: Weaponizing your coffee pot

As SoC price continue to drop and their implementation continues to rise, connected appliances (Internet of Things) will be become an attractive avenue for cyber criminals. …

Barracuda expands on Windows Azure

Barracuda Networks has expanded the number of its products available on the Windows Azure cloud platform. “The Barracuda Web Application Firewall, Barracuda NG Firewall …

Simplifying secure data migration to the public cloud

HighCloud Security announced new capabilities that enable enterprises to securely migrate data to and from the public cloud. This technology also lets customers leverage …

Dangerous vBulletin exploit in the wild

vBulletin is a popular proprietary CMS that was recently reported to be vulnerable to an unspecified attack vector. vBulletin is currently positioned 4th in the list of …

The cost and frequency of cyber attacks on the rise

The cost, frequency and time to resolve cyberattacks continue to rise for the fourth consecutive year, according to a global study by HP and the Ponemon Institute. The 2013 …

What can we learn from ICS/SCADA security incidents?

Increasing numbers of recent security incidents against industrial control systems/SCADA raise questions about the ability of many organisations to respond to critical …

Top IT predictions for 2014 and beyond

Gartner has revealed its top predictions for IT organizations and IT users for 2014 and beyond. The predictions for 2014 combine several disruptive topics — Digital …

SSD adoption grows despite difficult data erasure and recovery

The overwhelming majority (82%) of UK CIOs, CTOs and IT managers predict that their use of SSD technology will increase over the next 12 months, according to new research from …

Unisys Stealth for Mobile solution protects against BYOD issues

Unisys announced the Unisys Stealth for Mobile solution to address the security concerns facing enterprises as growing numbers of their employees use consumer devices at work. …

Microsoft exceedes 100 bulletins for 2013

It’s been an interesting month for the Microsoft Security watchers of the world. If your job depends on securing systems running Windows, you should be eagerly awaiting …

The Apple and WoW effect

Modern living is defined by pop culture phenomena. In the last few months alone, 4G rollouts, the release of smart watches and launch of long-awaited video games have all …

Free secure messaging app from Carnegie Mellon researchers

Carnegie Mellon University CyLab researchers have developed a free smartphone app for iOS and Android users to safely exchange identity data without risk of theft, deception …

Don't miss

Cybersecurity news