Please turn on your JavaScript for this page to function normally.
Study connects cybercrime to job loss

After years of guesswork and innumerable attempts to quantify the costly effects of cybercrime on the U.S. and world economies, McAfee engaged the Center for Strategic and …

Multiple Java versions on endpoints risky for enterprises

Java represents a significant security risk to enterprises because it is the endpoint technology most targeted by cyber attacks, show the results of Bit9 research. The …

New ReadyNAS rackmount devices from NETGEAR

NETGEAR announced ReadyNAS 3220 and ReadyNAS 4220, the latest NAS products to run on the ReadyNAS OS, introduced in March 2013. Available in 2U rackmount form with 12-bay …

Apricorn unveils FIPS 140-2 encrypted USB 3.0 drive

Apricorn debuted its Aegis Padlock Fortress, a secure drive designed specifically for the stringent requirements of the Government, Military and Healthcare. The first USB 3.0 …

BT Security CEO to keynote RSA Conference Europe 2013

RSA Conference announced BT Security CEO Mark Hughes as a keynote speaker for the 14th annual RSA Conference Europe, taking place from 29 – 31 October 2013, at Amsterdam …

Week in review: Hijacking connected cars, Android backup flaw, help desk security threats

Here’s an overview of some of last week’s most interesting news and articles: UEFI secure boot: Next generation booting or a controversial debate One of the first …

Major vulnerabilities in office security and RFID systems

At the Black Hat conference in Las Vegas, researchers will reveal critical vulnerabilities in many of the world’s most widely-used building security systems and …

ISACA updates IS Audit and Assurance Standards

ISACA has issued revised Information Systems (IS) Audit and Assurance Standards. The standards have an effective date of 1 November 2013. Introduced in 1988, the IS Audit and …

File infector EXPIRO hits US, steals FTP credentials

An unusual attack has been spotted in the wild, using an unexpected combination of threats. This attack used exploit kits (in particular Java and PDF exploits) to deliver file …

Bank security breaches destroy customer trust

85 percent of U.S. adults with banking accounts are at least somewhat concerned about online banking fraud, according to Entersekt. Such fraud can include phishing, malware, …

Switch secures confidential data on separate networks

Belkin expanded its secure product line with the addition of the Belkin DisplayPort KVM Switch. The new switch offers the ideal solution for federal and defense users who …

Tripwire updates Log Center solution

Tripwire announced the availability of its Log Center TLC 7.0 featuring the first phase of integration with IP360, as well as Tripwire’s new VIA Agent, log intelligence, …

Don't miss

Cybersecurity news