Please turn on your JavaScript for this page to function normally.
Metasploit Pro 4.5 released

Rapid7 released a new version of Metasploit Pro, which introduces advanced capabilities to simulate social engineering attacks. With Metasploit 4.5, security professionals can …

Password handling: challenges, costs, and current behavior

Online passwords are a pain, and not just when you have to type them to access your online bank account or shop at your favorite digital emporium. Password pain extends to the …

Microsoft to release five critical bulletins

Microsoft Security Bulletin Advance Notification for December 2012 contains seven bulletins; five critical and two important. Bulletin 1 adversely affects Internet Explorer 9 …

Cloud-based services revenue to increase

Cloud-based services revenue in two years is expected to comprise nearly twice its current share of provider revenue, even as providers believe that showing evidence of cost …

Identity and access management with MyAccessLive

Aveksa announced MyAccessLive, a SaaS Identity and Access Management solution. This new offering provides integrated visibility and control of both cloud and on-premise …

DARPA will start testing devices and software for backdoors

The scenario is one that information security experts dread: widespread dissemination of commercial technology that is secretly wired to function in unintended ways or even …

Half of CIOs don’t test cloud security

Cybersecurity tops CIO’s concerns, with 84% of CIOs stating that they are either concerned or very concerned about the risks associated with IT security breaches. Yet …

Cyber attacks resulting in death forecasted next year

WatchGuard’s security research analysts released a list of annual security predictions which reveals an uptick in emerging cyber threats and an increased focus by …

Secure iOS file transfers with QuickDrop

CloudPrime announced QuickDrop, a safe way to communicate and send files of any type between mobile devices. It is available immediately for iOS, and will be available for Mac …

Analysis of U.S. breach data finds reasons for concern

According to the Health Information Trust Alliance’s (HITRUST) analysis of U.S. healthcare data breaches from 2009 to the present, the healthcare industry has made …

Kaspersky Lab predicts core threats for 2013

Kaspersky Lab’s experts outlined key security trends of 2012 and presented their views on the core threats of 2013. The most notable predictions for the next year …

Privacy protection tips

Every month more than 5,000 people take to Twitter to complain about how their mobile device has been snooped on or their visual privacy invaded. Who can’t resist …

Don't miss

Cybersecurity news