Please turn on your JavaScript for this page to function normally.
Battles over online information control to escalate

The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, escalating battles over the control of online information and continuous …

Free ebook identifies easy to manage network security vulnerabilities

nCircle announced the release of a new eBook entitled “Just Turn it Off” (PDF, ePub). The book identifies twelve network security vulnerabilities that are both …

Businesses bracing for security impact on Cyber Monday

Most employees are not able to recognize online threats against the corporate network and companies are most concerned that online shopping could open the network to potential …

RSA enhances risk-based authentication solution

RSA announced enhancements to the RSA Adaptive Authentication On Premise solution designed to help organizations in wide range of industries achieve the right balance of …

Norton Mobile Security adds protection for iOS

Norton by Symantec released the latest version of Norton Mobile Security which delivers protection for consumers’ mobile needs, including support for iOS devices. New …

Video: Why privacy matters

Privacy International asked lawyers, activists, researchers and hackers at Defcon 2012 about some of the debates that thrive at the intersection between law, technology and …

PCI Council adds guidelines for data security risk assessment

The PCI Security Standards Council (PCI SSC) released the PCI DSS Risk Assessment Guidelines Information Supplement, a product of the PCI Risk Assessment Special Interest …

Tips for safe online shopping

Veracode released a new infographic, “Identity Theft: Staying Safe in an Online World,” that provides practical tips for keeping personal information safe when …

The right to be forgotten: Between expectations and practice

The right to be forgotten is one of the elements of the new proposed regulation on data protection of the European Commission. The right allows people to ask for digitally …

Google Chrome App grabs identities, forges blogs in victims’ name to promote scam

A Google Chrome app that promises to change the color of Facebook accounts instead nabs authentication cookies and generates dozens of blogs registered to the victims’ …

Video: Incident response and cloud computing

Moving into a cloud environment can bring many advantages to organizations in terms of flexibility, scalability and other benefits. However, it also brings a number of …

81% don’t trust cloud security

81 percent of IT professionals express security concerns when moving data to the cloud, according to a recent survey by GreenSQL. The survey focused on one question: …

Don't miss

Cybersecurity news