Please turn on your JavaScript for this page to function normally.
Microsoft Virtual Machine Servicing Tool 2012 released

Virtual Machine Servicing Tool (VMST) 2012 is designed to work with System Center 2012 -Virtual Machine Manager (VMM), System Center 2012 Configuration Manager and Windows …

More than half of employees fail to protect their data

A ComRes poll revealed that while 71% of employees have been able to see or read what someone is working on over their shoulder, 53% do not always take precautions to protect …

Coud-based security service for iOS devices

Websense released the new TRITON Mobile Security solution, a cloud-based security service for iOS devices on wireless mobile networks. It combines four key elements for …

vCat for Mobile: Mobile network emulation tool

Shunra announced vCat for Mobile, a network virtualization and application performance engineering solution designed specifically to help organizations test, validate, and …

Tenable Network Security updates vulnerability management solution

Tenable Network Security announced SecurityCenter Continuous View, a vulnerability management solution that provides real-time, continuous vulnerability, configuration, and …

Week in review: Gizmodo, Reuters, Blizzard hacks, and the underground economy of social network

Here’s an overview of some of last week’s most interesting news and articles: “Microsoft support” scammers still cold calling users The old …

Free cleanup tool for Morcut malware targeting Macs

MacClean is a free clean-up solution designed for Apple fans that may be infected by the Morcut malware. Once downloaded, this easy-to-use tool scans your Mac and alerts you …

Andy Murray is the most dangerous British athlete in cyberspace

Tennis player Andy Murray has topped a list of the most dangerous British athletes to search for on the web, according to McAfee. Following on from the annual McAfee Most …

10 steps to ensure users only access what they need

Every organization faces one challenge to their IT security position – the user. It doesn’t matter how much security training and advice a person is given – …

Stuxnet cousin able to attack industrial control systems

Today, extensive analysis on a new cyber espionage weapon dubbed “Gauss’ has been released, stating that the tool has capabilities to attack national critical …

Microsoft to release nine bulletins on Tuesday

For the second month running, Microsoft’s Patch Tuesday Advanced Notification includes nine bulletins. This month, five are rated “critical’ and four …

NIST updates guide for dealing with computer security incidents

The National Institute of Standards and Technology (NIST) has published the final version of its guide for managing computer security incidents. Based on best practices from …

Don't miss

Cybersecurity news