Please turn on your JavaScript for this page to function normally.
Cristiano Ronaldo is the most dangerous player in cyberspace

Increasingly, cybercriminals are exploiting the names of popular sports stars and celebrities to attract people to sites that actually conceal malicious software. Anyone …

ISO 27001 implementation: How to make it easier using ISO 9001

ISO 27001 and ISO 9001 may seem like quite different standards, but when you take a closer look at both, you can find a lot of similarities. They have the same …

Companies routinely share sensitive information via email

PhoneFactor announced a new survey data regarding the vulnerability of company email systems. The majority of respondents reported that highly sensitive information about …

Red Hat introduces open hybrid cloud solutions

Red Hat announced a set of solutions that the company plans to roll out in the coming months that are based on Red Hat products and technologies and are designed to enable …

Hack This: 24 Incredible Hackerspace Projects from the DIY Movement

Hack This is your passport to the world of hackerspaces: your invitation to share knowledge, master tools, work together and build amazing stuff. Twin Cities Maker co-founder …

FBI arrests 24 carders in online sting, UGNazi leader is among them

Following a two-year undercover operation led by the FBI, a coordinated action involving law enforcement agencies from 13 countries has led to the arrest of 24 individuals …

Cisco announces Linksys Smart Wi-Fi Router EA6500 with 802.11ac

Cisco announced its first Linksys Smart Wi-Fi Router and Universal Media Connector both powered by 802.11ac. The new technology is designed to deliver wireless speeds …

Removing the fear factor from BYOD

In May, HM Revenue and Customs (HMRC) said that it would ignore the government’s advice on BYOD (bring your own device) because of concerns around the security of the …

Customized webinjects for Zeus and SpyEye Trojans on sale

Criminals are now selling customized webinjects that are priced per feature. For example, one seller offers a webinject for Zeus/SpyEye that contains the automatic transfer …

Virtualization critical for disaster recovery

A BUMI survey, which polled CEOs, business owners and IT professionals at small- to mid-sized firms, found that 98 percent of respondents felt that more than one day to …

FIPS-validated mobile VPN for iPhone and iPad

Columbitech announced the availability of the enterprise-grade mVPN Secure Browser 5.0, which supports the iPhone, iPad and iPod Touch. The browser provides secure access to …

Windows 8 marks the beginning of the WinRT era

Windows 8 marks the beginning of the new WinRT (Windows Runtime) computing era and the beginning of the end of the WinNT era, according to Gartner. The combination of the …

Don't miss

Cybersecurity news