Please turn on your JavaScript for this page to function normally.
Seagate unveils complete SSD product line

Seagate took the wraps off its first client SSD and its next-generation enterprise SSDs. Featuring the Seagate 600 SSD, Seagate 600 Pro SSD, and the Seagate 1200 SSD, the new …

A radical shift in security needs

During the last 40 years we’ve seen a small number of significant, user-driven shifts in the computing landscape, which change the way businesses and IT departments …

Increase Facebook privacy with Safe Profile

76 percent of consumers are concerned about their privacy when they share their life on social platforms. Facebook’s array of privacy settings, which enable users to …

Analyzing 450 million lines of software code

A new Coverity report details the analysis of more than 450 million lines of software code through the Coverity Scan service. The service, which began as the largest …

Many social accounts are still in danger

The recent hacking of the Associated Press’ Twitter account has begged the question, how secure are social media accounts? A study released by IObit reveals that 30% …

Malwarebytes backup service prevents malware uploads

Malwarebytes Secure Backup, released today, is an online backup service that automatically scans files for malware prior to backup, removing the threat of saving or sharing …

Dell acquires Enstratius

Dell today announced the acquisition of Enstratius, which helps organizations manage applications across private, public and hybrid clouds, including automated application …

McAfee to acquire Stonesoft

McAfee and Stonesoft today announced a definitive agreement to initiate a conditional tender offer for the acquisition of Stonesoft for approximately $389 million in cash. …

No strategy for data protection?

While financial services organizations are obligated to establish and report stringent service availability objectives for mission-critical systems, they are actually among …

Cain & Abel 4.9.44 released

Cain & Abel is a password recovery tool for Microsoft operating systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted …

Week in review: Google Glass hacked, Bitcoin risks, and why we need security awareness training programs

Here’s an overview of some of last week’s most interesting news, reviews and articles: Info of 50M LivingSocial customers compromised following breach …

Multi-stage exploit attacks for more effective malware delivery

Most drive-by exploit kits use a minimal exploit shellcode that downloads and runs the final payload. This is akin to a two-stage ICBM (InterContinental Ballistic Missile) …

Don't miss

Cybersecurity news