Please turn on your JavaScript for this page to function normally.
Real-time apps and FTP are preferred malware targets

Palo Alto Networks published an analysis of new and evasive malware in live enterprise networks. Their findings show that traditional antivirus solutions are not identifying …

Targeted attacks and real world hacks

Web application attacks are the most significant security threat for IT infrastructures, according to Alert Logic. During a six-month study period, Alert Logic found that 48 …

PrivacyScan expands cleaning support for Internet and desktop apps

PrivacyScan 1.2 is now available in the Mac App Store with updated privacy cleaning features and support. PrivacyScan protects online and offline privacy by shredding files …

Digital cameras easily turned into spying devices, researchers prove

Users’ desire to share things online has influenced many markets, including the digital camera one. Newer cameras increasingly sport built-in Wi-Fi capabilities or allow …

Employees deliberately ignore security rules

A recent survey from Lieberman Software reveals that more than 80% of IT security professionals believe that corporate employees deliberately ignore security rules issued by …

Attacking SCADA wireless systems

Leased lines are recurring costs throughout the power grid. The bottom line demands the use of wireless solutions where possible. Dare we? We already do. The video below, …

Mobile device data recoveries surge

Kroll Ontrack saw a 55 percent increase in mobile device recoveries for phones and tablets from 2010 to 2011, and a 161 percent increase from 2011 to 2012. With more and more …

Fortinet to acquire Coyote Point

Fortinet has entered into a definitive merger agreement to acquire Coyote Point Systems, a privately-held provider of application delivery, load balancing and acceleration …

Week in review: Becoming a malware analyst, South Korean cyberattacks, Apple implements two-step verification for iCloud accounts

Here’s an overview of some of last week’s most interesting news, videos, podcasts, reviews and articles: Becoming a malware analyst If you’re considering a …

BYOD and data protection top concerns with cloud adoption

According to a new AccelOps survey, 65 percent of organizations are using cloud services, while only 46 percent have moved mission-critical applications and data outside the …

Piracy and IP theft trouble software publishers

A joint survey by SafeNet and SIIA of more than 620 software developers and 194 enterprise software end users, revealed that developers continue to struggle with how to secure …

GFI WebMonitor 2013 brings web filtering to off-network laptops

GFI Software announced GFI WebMonitor 2013, the latest version of the company’s Web security and filtering solution targeted at SMBs. This new version enables IT …

Don't miss

Cybersecurity news