Please turn on your JavaScript for this page to function normally.
Java apps can now be prevented from running in the browser

Oracle has released the newest version of its Java SE Development Kit (JDK 7u10), and apart from patching a few bugs, it has also introduced a couple of welcome changes that …

Who has access to your network and data?

GFI Software released guidelines for businesses ahead of the end of year holiday period, traditionally a time when many office-based businesses close for the festive season, …

56 alleged members of card fraud ring arrested in Europe

56 suspected members of a major network of payment card fraudsters (38 in Bulgaria, 17 in Italy and 1 in the Netherlands) have been arrested in a coordinated raid across …

14,000 Indian websites hacked in 2012

It has been reported that over 14,000 Indian websites have been hacked by cyber criminals this year, an increase of nearly 57 percent from 2009. Barry Shteiman, Senior …

Fluke Networks increases BYOD device visibility

Fluke Networks announced a new BYOD Classification capability that reduces the cost and time needed to optimize and secure a wireless network for authorized and unauthorized …

Get ready for invited break-ins, malware-ridden apps and spoof attacks

It’s that time of year again when, it seems, every technology vendor suddenly becomes clairvoyant with an insatiable urge to predict the battles we need to arm ourselves …

Blue Coat acquires Crossbeam Systems

Blue Coat Systems has entered into an agreement to acquire Crossbeam Systems. The acquisition is expected to close on December 31, 2012. “Our service provider and …

Payment processor for scareware cybercrime ring jailed

A Swedish credit card payment processor was sentenced today to 48 months in prison for his role in an international cybercrime ring that netted $71 million by infecting …

Improving information security with one simple question

Anyone who has children, or has had to deal with very young children, will understand how powerful the word “why” is and how it can drive their curiosity. …

Looking to the future: Security predictions for 2013

The door is closing on 2012, and it’s time to look ahead to next year. As you round out your 2013 business and IT plans, cybercriminals are resolving to implement …

Reinvent your security approach

Tasked with ensuring the success of business-changing IT initiatives from mobile and BYOD to virtualization and cloud services, IT security is finding that existing security …

Windows 8 Hacks

Windows 8 is quite different than previous Microsoft operating systems, but it’s still eminently hackable. With Windows 8 Hacks, you’ll learn how to make a variety …

Don't miss

Cybersecurity news