Please turn on your JavaScript for this page to function normally.
Blackhole exploits lead a black month for malware

In October, GFI Software threat researchers uncovered a large number of Blackhole exploits disguised as Windows licenses (just prior to the release of Windows 8), Facebook …

How teens hide their online activity

A European survey commissioned by McAfee has revealed an alarming disconnect between what teens are getting up to online, and what parents are aware of. Many UK teens are …

Generation Tech: Gifted but a long way from bad

They have been described as technology’s Generation Y or Generation Tech: an undisciplined, impulsive, entitled horde of twenty-something workers, seen as one of the …

Half of business information resides outside the firewall

Symantec launched its first Digital Information Index highlighting the significant impact that cloud computing and mobility are having on businesses today. There are benefits …

ForgeRock launches open source stack to secure applications and services

ForgeRock announced availability of an open source stack to secure applications and services across enterprise, cloud, social and mobile environments. With more than 250K …

IRISSCERT warns Irish businesses on key cybercrime threats

IRISSCERT is to hold its fourth annual cybercrime conference this coming Thursday the 22nd of November where they will highlight key trends and issues that businesses in …

Week in review: Staying safe on Cyber Monday, Skype fixes account hijacking vulnerability, Adobe admits breach

Here’s an overview of some of last week’s most interesting news and articles: One in four users at risk due to outdated browsers Nearly a quarter of users …

Over 10,000 identity fraud rings active in the U.S.

There are more than 10,000 identity fraud rings in the U.S. according to a new study released today by ID Analytics’ ID:A Labs. An identity fraud ring is a group of …

Companies collecting personal info face financial risks

Many organizations lack the business behaviors and compliance practices necessary to adequately address growing consumer and regulatory concerns about data security and …

Despite security concerns, enterprises place sensitive data in the cloud

One third of enterprises place highly sensitive data in the public cloud even though most are wary of the implications on security and other business processes, according to …

McAfee All Access 2013 released

McAfee announced enhancements to McAfee All Access, an integrated cross-device security product for PCs, Macs, smartphones and tablets. The new, consolidated dashboard enables …

European enterprises cautiously accepting BYOD

Results of the European edition of the ISACA IT Risk/Reward Barometer show slowly growing acceptance of BYOD in the workplace, with 28% of organisations freely allowing the …

Don't miss

Cybersecurity news