Please turn on your JavaScript for this page to function normally.
Android malware continues to dominate the mobile threat landscape

F-Secure recently released the latest version of their Mobile Threat Report which covers Q3 2012. This is the executive summary related to Android threats. As expected, …

New IronKey hardware-encrypted secure flash drives

Imation Corp. announced the availability of two new IronKey hardware-encrypted rugged flash drives – S250 and D250 . The IronKey flash drives deliver powerful protection …

IT in the organization: four possible scenarios for the future

The changing shape of IT is causing CIOs to question the role of IT in the organization. As businesses confront global economic uncertainty, changing market dynamics and …

Adobe Reader 0-day exploit sold for $50,000

The good news is that the exploit costs $50,000 which limits the purchase of it to defense contractors, nation states and some criminal organizations that may be able to …

Video demonstration: New Adobe Reader zero-day exploit

Russian based security company Group-IB announced a new zero day vulnerability in Adobe Reader 10 and 11. According to their research, the exploit bypasses Reader’s …

New batch of Trusted Computing Group certified products

Trusted Computing Group has recently certified four products, including a Trusted Platform Module (TPM) and three products supporting the group’s security automation …

YubiKey NEO authentication token released

Yubico announced the production launch of the YubiKey NEO, a new authentication token that features Near Field Communications (NFC) technology, asymmetric cryptography support …

Secure View 3 recovers deleted data from Android phones

Susteen’s Secure View 3 digital forensics product is now able to recover deleted data from the large majority of Android phones. Law enforcement, military and government …

Infographic: “How companies track you on the Web”

Veracode’s new infographic illustrates how privacy transference has evolved into a major problem for consumers who willingly give information to businesses online, but …

How to stay secure in a changing world

In Sir Isaac Newton’s time there were three laws of motion, which dominated the scientific view of the world. While he, and his scientific peers, might have had many …

Alarming number of merchants unaware of PCI DSS

The last four years have been marked by continued growth in small business data compromise, yet small business owners are still missing the point of the PCI DSS, a ControlScan …

Secure data-at-rest and data-in-motion on iOS and Android

Companies are moving their core business operations to mobile apps. App developers are at the center of this transformation and must deliver great apps quickly while ensuring …

Don't miss

Cybersecurity news