Please turn on your JavaScript for this page to function normally.
Three major impacts when moving to a BYOD policy

Seventy percent of respondents in a recent survey by Gartner, Inc. said that they have or are planning to have BYOD policies within the next 12 months to allow employees to …

Guidance Software unveils fast forensic bridge

Guidance Software announced the Tableau T35u USB 3.0 forensic SATA/IDE bridge for forensic imaging in both lab and field environments. The T35u supports write-blocked, …

Sendmail and Mimecast partner on hybrid-cloud email security

Sendmail and Mimecast announced a new partnership that provides additional enhanced options for integrating and configuring email management solutions, which are needed to …

Three out of every four malware infections are caused by Trojans

PandaLabs analyzed the IT security events and incidents from July through September 2012. The third quarter of the year has seen an increase in the number of hacking attacks …

Facebook and Google+ are prime targets for easy attacks

The law created to protect children’s online privacy actually increases risk, according to new research from Polytechnic Institute of New York University (NYU-Poly). The …

Employees use file sharing services despite bans

Large numbers of employees use Dropbox and other consumer file sharing services for sensitive work-related data, even if they know that their employer has a specific policy …

Would you dump your network provider after a security breach?

Compromised security – rather than high monthly fees – would be the biggest catalyst for triggering UK smartphone users to change mobile network providers. The …

Security experts debate moving critical infrastructure online

Paul Simmonds, Co-Founder of The Jericho Forum, has suggested that companies attempting to reduce costs by moving critical systems online could be opening themselves up to …

CompTIA A+ Complete Lab Manual

Designed to complement CompTIA A+ Complete Study Guide, this hands-on companion book takes you step by step through the tasks a PC technician is likely to face on any given …

Week in review: SANS’ real-world cyber city, and the return of an aggressive autorun worm

Here’s an overview of some of last week’s most interesting news and articles: eBay patches two critical security flaws on US website Two critical vulnerabilities …

Personal data of 235,000 WCSU students exposed

Western Connecticut State University has begun notifying students, their families, and individuals who had other associations with the university that their personal …

Nmap 6.25 released

Nmap is a free and open source utility for network exploration or security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the …

Don't miss

Cybersecurity news