Please turn on your JavaScript for this page to function normally.
Information Storage and Management

Information Storage and Management covers the components of a storage system and the different storage system models while also offering essential new material that explores …

Week in review: New cyber weapon Flame, gamers under attack, and the new issue of (IN)SECURE Magazine

Here’s an overview of some of last week’s most interesting news, podcasts, videos, interviews and articles: Privacy trends affecting security In this podcast …

Privacy practices of the Internet’s biggest companies

When you use the Internet, you entrust your thoughts, experiences, locations, and more to companies like Google, Twitter, and Facebook. But what happens when the government …

Could security breaches cost lives?

Over a quarter of companies believe that if their sites go down or they suffer a major security breach it could potentially cost customers’ their lives, according to …

HTML5 browser-based, certificateless encryption platform

CertiVox launched the PrivateSky, a service that provides protection for messages, files and other information sent via the cloud through a two-factor authentication process …

Wireless Network Security A Beginner’s Guide

Protect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner’s Guide discusses the many attack vectors …

When syncing sinks your browser

Google Chrome’s most recent version (v19) introduced a “tab sync” feature. When inspecting this feature from a security perspective we realized that a new …

AuthenTec releases Eikon mini USB fingerprint reader

AuthenTec introduced the Eikon mini USB fingerprint reader. The ergonomically designed Eikon mini integrates AuthenTec’s AES2660 smart fingerprint sensor and was …

iOS and Android security solutions from F-Secure

F-Secure Mobile Security, which provides protection for Android phones and tablets, can now be purchased on Google Play. F-Secure Child Safe, which is a browser for parental …

Cybercrime goes mobile

Corporate espionage has never been so easy. See how a simple app can transform your smartphone into an espionage tool in the hands of criminals, able to record your …

Malware detection for Nessus vulnerability scanner

Tenable announced new malicious process detection capabilities on Windows computers for the Nessus vulnerability scanner. This new functionality complements and extends AV …

Juniper Networks enhances its Mykonos Web Security software

Juniper Networks announced major platform enhancements to its Mykonos Web Security software. The new release provides 30 new features and enhancements that strengthen …

Don't miss

Cybersecurity news