Please turn on your JavaScript for this page to function normally.
First look at Windows 8 security features

Windows 8 launched this week. It brings a new interface, but under the hood, it introduces a number of new security features. The most significant change in terms of security …

Best practices from healthcare and compliance experts

Data breaches in healthcare are raising alarm. Nearly 20 million patient health records have been compromised in the past two years, according to the U.S. Department of Health …

Windows 8 launch prompts thoughts on life after XP

Much has been made of the extensive changes that Microsoft has revealed around the aesthetics and performance of Windows 8, as well as the possible effects these changes will …

The anatomy of cyber security exercises

In its new report, the EU’s ‘cyber-security agency’ ENISA (the European Network and Information Security Agency) examines 85 national and international …

Real user monitoring for web developers

AppNeta announced Real User Monitoring (RUM) capabilities designed for web development and application performance. As a key feature of AppNeta’s TraceView application …

Steganos Privacy Suite 14 released

The newly released Steganos Privacy Suite 14 is designed for individuals who want privacy protection for their data and Internet activities – including on their …

Microsoft releases Windows 8

Microsoft today announced the global availability of Windows 8. Beginning Friday, Oct. 26, consumers and businesses worldwide will be able to experience all that Windows 8 has …

Video: Bill Gates on Windows 8, Windows Phone 8 and Surface

Here’s Bill Gates talking about the significance of this week’s launch of Windows 8, about Windows Phone 8 and Surface.

Banker pleads guilty to sharing personal information of account-holders

LeRoy Brown, a former personal banker from Washington, D.C., pled guilty to conspiracy to commit bank fraud for his role in an identity theft scheme involving $121,400 in …

New cybercrime monetization methods

AVG’s new report investigates a number of malicious software developments including the newly launched 2.0 version of the Blackhole Exploit Toolkit, the evolution in …

Worst passwords of 2012

Just in time for Halloween comes something that might scare anyone who spends a lot of time online: SplashData’s annual list of the most common passwords used on the …

Phishing websites proliferate at record speed

A new phishing survey released by the Anti-Phishing Working Group (APWG) reveals that while the uptime of phishing websites dropped during the first half of 2012, …

Don't miss

Cybersecurity news