Please turn on your JavaScript for this page to function normally.
What’s the most coveted target for cyber attackers?

Despite repeated warnings, organizations are still failing to lock down the primary target of most cyber-attacks – privileged access points. Cyber-Ark labs analyzed a …

Tips for a safe online shopping season

The holiday season presents the perfect opportunity for cybercriminals to steal consumers’ information as shopping is increasingly conducted online. According to a 2011 …

Battles over online information control to escalate

The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, escalating battles over the control of online information and continuous …

Free ebook identifies easy to manage network security vulnerabilities

nCircle announced the release of a new eBook entitled “Just Turn it Off” (PDF, ePub). The book identifies twelve network security vulnerabilities that are both …

Businesses bracing for security impact on Cyber Monday

Most employees are not able to recognize online threats against the corporate network and companies are most concerned that online shopping could open the network to potential …

RSA enhances risk-based authentication solution

RSA announced enhancements to the RSA Adaptive Authentication On Premise solution designed to help organizations in wide range of industries achieve the right balance of …

Norton Mobile Security adds protection for iOS

Norton by Symantec released the latest version of Norton Mobile Security which delivers protection for consumers’ mobile needs, including support for iOS devices. New …

Video: Why privacy matters

Privacy International asked lawyers, activists, researchers and hackers at Defcon 2012 about some of the debates that thrive at the intersection between law, technology and …

PCI Council adds guidelines for data security risk assessment

The PCI Security Standards Council (PCI SSC) released the PCI DSS Risk Assessment Guidelines Information Supplement, a product of the PCI Risk Assessment Special Interest …

Tips for safe online shopping

Veracode released a new infographic, “Identity Theft: Staying Safe in an Online World,” that provides practical tips for keeping personal information safe when …

The right to be forgotten: Between expectations and practice

The right to be forgotten is one of the elements of the new proposed regulation on data protection of the European Commission. The right allows people to ask for digitally …

Google Chrome App grabs identities, forges blogs in victims’ name to promote scam

A Google Chrome app that promises to change the color of Facebook accounts instead nabs authentication cookies and generates dozens of blogs registered to the victims’ …

Don't miss

Cybersecurity news