Please turn on your JavaScript for this page to function normally.
Cloud-based security services still in high demand

By 2015, 10 percent of overall IT security enterprise product capabilities will be delivered in the cloud, according to Gartner. The services are also driving changes in the …

TDoS: The latest wave of Denial of Service attacks

Hackers have been able to weasel their way into computer networks from nearly every direction. From malware to ransomware, and everything in between, cyber crooks are always …

Real-world test of 21 antivirus products

AV-Comparatives have released results of their latest Real-World Protection Test. These show that in a real-world digital environment with ever-increasing malicious programs, …

Employees admit to accessing or stealing private company information

In a survey of 1,000 employers by LogRhythm, 80 percent do not believe any of their workers would view or steal confidential information, while three quarters (75 percent) …

INTERPOL Chief on fighting cybercrime worldwide

INTERPOL Secretary General Ronald K. Noble has said that global efforts against cybercrime and to enhance cyber security require law enforcement and private sector Internet …

Week in review: Hijacking airplanes with an Android phone, and a call to arms for infosec professionals

Here’s an overview of some of last week’s most interesting news, articles and videos: Spear-phishing emails targeting energy companies Information over-sharing can …

Sophisticated threats and thinking like the attacker

Sophisticated attackers are making us think differently about how we approach security. They are methodical, persistent, creative and often times well funded. Approaching …

Sentinel Envelope ensures code integrity and app security

SafeNet announced the availability of its third-generation Sentinel Envelope technology, which helps software developers protect code integrity and deliver application …

Private file storage and sharing app from Gemalto

Gemalto has extended its portfolio of end-user cloud services solutions for mobile network operators with an innovative private file storage and sharing application. LinqUs …

BirdStep updates SafeMove mobile VPN solution

Birdstep Technology released SafeMove Mobile VPN 7.0 (MVPN), which introduces several features, including performance, manageability and user experience improvements. Windows …

You’ve been hacked, now what?

Given the increased frequency and complexity of cyber attacks on business networks of all sizes, the odds of experiencing a breach is almost guaranteed if the right security …

Controlling the physical world with BacNET attack framework

The integration of computer technology to monitor the inner works of large office buildings, factories and plants has been evolving for years. These types of systems are often …

Don't miss

Cybersecurity news