Please turn on your JavaScript for this page to function normally.
The rise of everyday hackers

Veracode released its annual State of Software Security Report, which includes research on software vulnerability trends as well as predictions on how these flaws could be …

Week in review: Carberp Trojan developers arrested, thousands of compromised Apache servers directing users to malware

Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: Hackers attacking US banks are well-funded, expert says The Cyber …

10 best practices for securing data in Hadoop

Dataguise released ten security best practices for organizations considering or implementing Hadoop. By following these procedures to manage privacy risk, data management and …

Microsoft to release 9 advisories on Tuesday

April 2013 advance notice is out and it forecasts an interesting patching session for Microsoft administrators. There are 9 advisories affecting 16 distinct platforms in 5 …

Tips for securely using free Tube Wi-Fi

GFI Software warned of potential data and device security concerns posed by using London’s public Wi-Fi service, installed across large parts of the London Underground …

Destroy solid state storage and optical media

Data Security unveiled their SSMD-2mm Destruction Device which disintegrates solid state and optical media to particles 2mm in size or smaller. NSA has evaluated the SSMD-2mm …

Malware attacks occur every three minutes

Malware activity has become so pervasive that organizations experience a malicious email file attachment or Web link as well as malware communication that evades legacy …

Ciphertex releases 24TB portable, secure NAS server

The new 24TB portable, highly secure NAS server from Ciphertex is meant for backup, disaster recovery and business continuity, file sharing and virtualization. “The …

Security professionals don’t have secure mobile habits

Security professionals have embraced BYOD and they’re taking “anytime, anywhere” access to some pretty interesting locations according a new survey by Ping …

DIY: Using trust to secure embedded projects

This talk from Shmoocon 2013 provides a DIY guide to using Trusted Computing on embedded devices. The authors introduce a low-cost schematic using Atmel’s CryptoModule …

Tips for avoiding tax scams

As the April 15 deadline for tax filing draws near, the Center for Internet Security (CIS) helps users recognize tax-related scams and better defend against them. Findings …

F-Secure rebuilds free Online Scanner

F-Secure’s free Online Scanner tool has been completely rebuilt to be faster, lighter and more powerful than before, and now even cleans up advanced rootkits, the most …

Don't miss

Cybersecurity news