Please turn on your JavaScript for this page to function normally.
Microsoft releases 12 bulletins that address 57 vulnerabilities

The second Patch Tuesday of 2013 has a much higher volume than usual. There are 12 bulletins, five of which are critical, addressing a total of 57 vulnerabilities. But the …

Highlights from 450 global data breach investigations

Trustwave released details form a report that highlights details and trends from 450 global data breach investigations, 2,500 penetration tests, nine million Web application …

Unintended, malicious and evil applications of augmented reality

Most new products begin life with a marketing pitch that extols the product’s virtues. A similarly optimistic property holds in user-centered design, where most books …

UK hit by 120,000 cyber attacks a day

A report from the National Audit Office has warned that Britain’s IT skills shortage means that the country and its critical infrastructure could be unable to defend …

FIDO Alliance designs open, non-proprietary authentication protocol framework

Internet companies, system integrators and security providers have formed the FIDO Alliance (Fast IDentity Online) to revolutionize online authentication with an industry …

Sophos extends UTM to the enterprise

Sophos has strengthened its network security offerings with two enhanced high-end UTM appliances, Sophos UTM 525 and 625, and the new Sophos RED 50 (Remote Ethernet Device), …

Data protection practices in EU and Asia

Research undertaken by Field Fisher Waterhouse into the existing legal framework mandating encryption of personal data in the EU and Asia details legal requirements and …

New security startup tackles strong authentication

Nok Nok Labs launched today. Through its Unified Authentication Infrastructure, which leverages existing technologies such as fingerprint sensors or webcams, TPM chips, or …

Tweet your way to a VIP ticket to HITBSecConf2013 in Amsterdam

Hack In The Box launched the #HITB1337Giveaway – A Twitter based competition that will see one lucky winner not only walk away with a VIP ticket to the triple track …

BYOD is just the tip of the iceberg

The growth in cloud storage devices means that corporate IT departments are now at the mercy of consumer-based applications, as more and more employees look to take their work …

Cybersecurity concerns of online dating

ThreatMetrix announced several ways for consumers to stay protected from online dating fraud and malware as Valentine’s Day approaches. According to Fast Company, online …

Identity theft protection tips

More than 11.6 million adults were victims of identity theft in 2011, according to Javelin Strategy & Research. Child identity theft is also a significant problem, which …

Don't miss

Cybersecurity news