Please turn on your JavaScript for this page to function normally.
Forensic access to iCloud backups

iPhone users have several options to back up the content of their devices. They can backup information stored in their device such as contacts, pictures, call logs and data …

McAfee and Intel protect the critical infrastructure together

McAfee announced a collaboration with Intel to better protect the world’s energy utility ecosystem, including generation, transmission and distribution, from increased …

Microsoft shows cloud computing security benefits

Small and midsize businesses (SMBs) are gaining significant IT security benefits from using the cloud, according to a new Microsoft study in five geographies. The study shows …

Getting started with RFID

If you want to experiment with radio frequency identification (RFID), this book is the perfect place to start. All you need is some experience with Arduino and Processing, the …

Android remote systems administration tools

Cura is a mobile phone application bundle of remote systems administration tools. It provides a personalized terminal emulator, a syslog module that allows for reading logs …

Qualys adds security experts to CTO/CSO advisory board

Qualys announced today the newest additions to its CSO/CTO Advisory Board. The four new members join information security leaders from eBay, Goldman Sachs, Microsoft, PayPal, …

Cloud data encryption for Hosted Exchange

Vaultive announced Vaultive for Hosted Exchange, a cloud data encryption solution that enables customers to encrypt data-at-rest and data-in-use within the Hosted Microsoft …

IT candidates should shift career perspectives

Recruiting in the technology sector is strong, despite weaknesses and structural changes the economy has experienced over the past several years. Enterprises seem to be …

Alternative app marketplaces prove profitable for cybercriminals

Avast researchers discovered a new batch of fake alternative marketplaces for downloading smartphone apps that trick users into sending premium rate SMS messages. Using a …

Secure online voting on iOS and Android

Scytl announced today the successful implementation of its online voting encryption technology for use on Android and iOS. By encrypting the ballot on the voter’s device …

Fuzz-o-Matic finds critical flaw in OpenSSL

Codenomicon helped identify and a critical flaw in widely-used encryption software. A flaw in the OpenSSL handling of CBC mode ciphersuites in TLS 1.1, 1.2 and DTLS can be …

Week in review: Massive carding ring bust, cyber attacks against US gas companies, and the creation and evolution of the superuser

Here’s an overview of some of last week’s most interesting news, podcasts and articles: Phishers mimic OpenID to steal credentials New spam email campaigns are …

Don't miss

Cybersecurity news