Please turn on your JavaScript for this page to function normally.
Top words cybercriminals use in fake emails

The top words cybercriminals use create a sense of urgency, to trick unsuspecting recipients into downloading malicious files. The top word category used to evade traditional …

Ethics of Big Data

What are your organization’s policies for generating and using huge datasets full of personal information? Ethics of Big Data examines ethical questions raised by the …

Big Data grows as data security shrinks

A report published by PricewaterhouseCoopers (PwC) has revealed that despite the growing issue of “Big Data,” most organisations are actually keeping looser tabs …

Decoding digital danger: The ever-moving threat

It was announced recently that GCHQ, the Government’s electronic intelligence unit, is to advise Britain’s senior business leaders on how to oppose the mounting …

Gartner says Windows 8 is a big gamble

Microsoft is taking a big gamble over the next few months with Windows and Office, the two products responsible for most of its revenue and profit, according to Gartner. It is …

Learning Unix for OS X Mountain Lion

Beneath OS X easy-to-use GUI interface lies a powerful Unix engine. Mac users have Unix, as well as a host of tools ported over from Linux, at their fingertips; the just need …

Week in review: IE zero-day patched, Flame C&Cs reveal more malware, and the new issue of (IN)SECURE Magazine

Here’s an overview of some of last week’s most interesting news and articles: Google adds Do Not Track support to Chrome The next official release of …

Ex-CME programmer admits to stealing source code

A former senior software engineer for Chicago-based CME Group pleaded guilty to theft of trade secrets for stealing computer source code and other proprietary information …

Key components for mobile device management of BYOD

The Cloud Security Alliance (CSA) Mobile Working Group released a research report identifying 17 key elements that are critical for organizations to consider for the full …

Moving federal mission-critical applications to the cloud

As federal agencies are making cloud progress, the early-adopters that are moving their mission-critical applications to the cloud are realizing cost savings and improved …

SUSE Manager update streamlines Linux management

SUSE released SUSE Manager 1.7 of its systems management solution for enterprise Linux environments. SUSE Manager’s capabilities help enterprises to comprehensively …

ActivClient Mobile SDK for iOS released

HID Global released the ActivClient Mobile SDK for iOS. Application developers, enterprises, government entities and other organisations will benefit from this SDK with …

Don't miss

Cybersecurity news