Please turn on your JavaScript for this page to function normally.
Information security: Understanding a global picture in a local context

“Think globally, act locally” is a phrase now cliche because it expresses an incontrovertible and immediately graspable truth. The global/local concept applies …

Cyber risk perceptions revealed

A survey of perceptions about cyber risk found that among corporate executives, more are concerned about cyber threats than about other major business risks. More than 85% of …

Nearly a third of all computers are infected with malware

PandaLabs released its annual security report which details an extremely interesting year of data theft, social networking attacks and cyber-warfare. The most devastating …

RedSeal 6.5 supports BYOD, SIEM and risk metrics

RedSeal Networks released the latest version of the RedSeal Platform to protect companies and government agencies from attacks across the network. “In an ideal world, …

Examining the Nap malicious downloader

We recently encountered a stealthy malware that employs extended sleep calls to evade automated analysis systems capturing its behavior. It further makes use of the fast flux …

List of products affected by the vulnerable Broadcom UPnP stack

Recently, DefenseCode researchers have uncovered a high-risk Broadcom UPnP stack remote root vulnerability. The vulnerability is located within the wanipc and wanppp modules …

Fear of government snooping hinders cloud adoption

Almost half of IT experts are deterred from keeping sensitive data in the cloud because of fear of government intervention and possible legal action, according to Lieberman …

None of the 100 largest e-commerce sites have fully implemented DNSSEC

The biggest brands in e-commerce are overlooking a critical security technology that could reduce the risk of identify theft and credit card fraud. An analysis of the 100 …

Oracle releases MySQL 5.6

Oracle today announced MySQL 5.6, the world’s most popular open source database. With increased performance, scalability, reliability and manageability, MySQL 5.6 helps …

Digital certificates and malware: a dangerous mix

In the past few days we have heard several stories about major corporations getting hacked and their security systems completely bypassed. If anything, that should remind us …

Business is booming for exploits, mobile malware

Business is thriving for exploits, mobile malware is still dominated by Android and Symbian, and botnets are back and retooled, according to a new threat report from F-Secure …

The privacy cliff and how not to fall off it

We are all hearing the phrase “fiscal cliff” considerably more times than is useful. So far, however, nobody’s mentioned a “privacy cliff.” They …

Don't miss

Cybersecurity news