Please turn on your JavaScript for this page to function normally.
IT challenges with managing increasing amounts of data

Half of all organizations EVault surveyed in the USA, UK, France, Germany, and the Netherlands say they are managing more data now than they were a year ago, and 70 percent of …

People need help controlling personal info online

Microsoft released new data reflecting consumers’ perceptions about how their information is used online and a new series of short videos to help people better manage …

RSA introduces disaster recovery and crisis management solution

RSA, the Security Division of EMC, introduced two additions to its RSA Archer product suite designed to help customers meet ever changing and comprehensive business …

The arrival of the post-PC threat era

With the release of its 2012 Annual Roundup and Mobile Security reports, Trend Micro documents how cybercriminals have moved beyond the PC, targeting Android, social media and …

Most exploit kits originated in Russia, say researchers

58 percent of the vulnerabilities targeted by the most popular exploit kits in Q4 were more than two years old and 70 percent of exploit kits reviewed were released or …

DNS attacks increase by 170%

Radware identified a number of new attack methods representative of today’s increasingly sophisticated and severe DDoS threat. Their latest report highlights …

Embrace BYOD or die

Dell Quest Software announced the results of a global survey of IT executives to gauge the level of organizational maturity with existing BYOD strategies, along with realized …

Video: History of the JavaScript security arsenal

In 2006 we had the first JavaScript port scanner. The same year we saw the incarnation of more advanced tools such as AttackAPI, Carnaval and Backframe. A year later we saw …

The cloud will impact the way security is consumed

Increased adoption of cloud-based computing is expected to impact the way security is consumed as well as how key government agencies will prioritize security of public cloud …

Twitter bug gives 3rd-party apps access to users’ Direct Messages

A Twitter bug allowed third-party applications to access Direct Messages of users who signed in to the apps by using their Twitter account, reported IOActive researcher Cesar …

Video: Data mining a mountain of vulnerabilities

Every day, software developers around the world, from Bangalore to Silicon Valley, churn out millions of lines of insecure code. Veracode used static binary analysis on …

GFI EventsManager now with active monitoring

GFI Software announced that GFI EventsManager now includes the active network and server monitoring capabilities found in the NetworkServerMonitor solution. This new …

Don't miss

Cybersecurity news