Please turn on your JavaScript for this page to function normally.
iPhone-controlled keyless lock

Lockitron replaces keys with your phone. With Lockitron, you can instantly grant family, friends and guests access to your home or business from anywhere in the world using …

Week in review: White House Military Office breach, Brian Honan on infosec pros and the Incapsula review

Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: Interesting times for information security professionals Our modern …

Microsoft acquires PhoneFactor

Microsoft has acquired PhoneFactor, a developer of multifactor authentication (MFA) solutions. “The acquisition of PhoneFactor will help Microsoft bring effective and …

Microsoft to release seven bulletins

Microsoft Security Bulletin Advance Notification for October 2012 contains seven bulletins, one critical and six rated as important. It should be a relief to many that none of …

Cloud Security Alliance outlines top mobile threats

The Cloud Security Alliance (CSA) Mobile Working Group released findings from a new survey that calls out the specific security concerns enterprise executives say are the real …

Free online identity risk calculator

EMC and RSA announced the Online Identity Risk Calculator, a free interactive assessment tool for PC and mobile device users designed to help educate consumers about their …

Cloud solution delivers risk-based information security programs

TraceSecurity introduced TraceCSO, which allows organizations of any size, industry or security skill set to evaluate, create, implement and manage a risk-based information …

The Death of the Internet

Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, …

FTC cracks down on international tech support scams

The Federal Trade Commission has launched a major international crackdown on tech support scams in which telemarketers masquerade as major computer companies, con consumers …

HSTS approved as proposed standard

The Internet Engineering Steering Group (IESG) has approved the HTTP Strict Transport Security protocol (HSTS) as a proposed standard, which means that we can look forward to …

Europe joins forces in massive simulated cyber attack

Hundreds of cyber security experts from across the EU are testing their readiness to combat cyber-attacks in a day-long simulation across Europe today. In Cyber Europe 2012, …

Authentication-as-a-Service designed for service providers

SafeNet announced SafeNet Authentication Service, a new cloud-based authentication service designed and engineered specifically for the service provider environment and allows …

Don't miss

Cybersecurity news