Please turn on your JavaScript for this page to function normally.
The anatomy of cyber security exercises

In its new report, the EU’s ‘cyber-security agency’ ENISA (the European Network and Information Security Agency) examines 85 national and international …

Real user monitoring for web developers

AppNeta announced Real User Monitoring (RUM) capabilities designed for web development and application performance. As a key feature of AppNeta’s TraceView application …

Steganos Privacy Suite 14 released

The newly released Steganos Privacy Suite 14 is designed for individuals who want privacy protection for their data and Internet activities – including on their …

Microsoft releases Windows 8

Microsoft today announced the global availability of Windows 8. Beginning Friday, Oct. 26, consumers and businesses worldwide will be able to experience all that Windows 8 has …

Video: Bill Gates on Windows 8, Windows Phone 8 and Surface

Here’s Bill Gates talking about the significance of this week’s launch of Windows 8, about Windows Phone 8 and Surface.

Banker pleads guilty to sharing personal information of account-holders

LeRoy Brown, a former personal banker from Washington, D.C., pled guilty to conspiracy to commit bank fraud for his role in an identity theft scheme involving $121,400 in …

New cybercrime monetization methods

AVG’s new report investigates a number of malicious software developments including the newly launched 2.0 version of the Blackhole Exploit Toolkit, the evolution in …

Worst passwords of 2012

Just in time for Halloween comes something that might scare anyone who spends a lot of time online: SplashData’s annual list of the most common passwords used on the …

Phishing websites proliferate at record speed

A new phishing survey released by the Anti-Phishing Working Group (APWG) reveals that while the uptime of phishing websites dropped during the first half of 2012, …

Most effective ways to stop insider threat

Imperva examined the psychological, legal and technological tactics employed by leading organizations to mitigate insider threats, a class of enterprise risk perpetuated by a …

Qualys extends QualysGuard Cloud Platform

Qualys announced that QualysGuard Vulnerability Management will now feature vulnerability prediction capabilities within a new dashboard and threat reports for zero-days and …

Entrust IdentityGuard delivers mobile smart credentials

To enable organizations to secure and leverage mobile devices in the wake of BYOD trends, Entrust extends its identity-based security platform with Entrust IdentityGuard …

Don't miss

Cybersecurity news