Please turn on your JavaScript for this page to function normally.
Programming iOS 5, 2nd Edition

Get a solid grounding in the fundamentals of Cocoa Touch, and avoid problems during iPhone and iPad app development. With this revised and expanded edition of Programming iOS …

Week in review: Hotmail 0-day bug, CISPA, and securing embedded devices

Here’s an overview of some of last week’s most interesting news, podcasts and articles: SpyEye botnet for sale at bottom price A drop in the price asked for the …

Mobile malware increasingly delivered via social networks

The growing use of mobile devices to connect with social networks is fast becoming a preferred method for cyber criminals to spread malware, particularly on those devices …

PayPal no longer the most phished brand

A new phishing survey released by the Anti-Phishing Working Group (APWG) reveals that in the second half of 2011, China’s Taobao.com became the world’s most …

HITRUST establishes incident response center for healthcare Industry

In light of growing threats posed by cyber attacks targeted at healthcare organizations, the Health Information Trust Alliance (HITRUST) has established the HITRUST …

Web and content filtering appliances by Bloxx

Bloxx announced the release of the Bloxx Secure Web Gateway (SWG), an appliance that combines the company’s dynamic real-time content analysis and classification engine, …

Anomaly detection solution for mobile banking

Guardian Analytics announced FraudMAP Mobile, the company’s latest fraud prevention innovation, purpose-built to identify suspicious mobile banking activity. The …

Cisco CCNP Service Provider certification announced

Cisco announced the availability of its Cisco CCNP Service Provider certification developed to validate the skills and knowledge of network engineers to deploy and optimize a …

A security scanner for SAP 2.0

ERPScan has released ERPScan Security Scanner for SAP 2.0 – a complex solution to continuously monitor all areas of SAP security, from vulnerability assessment and …

Centralized management for self-encrypting drives

Credant Technologies announced Credant Enterprise Edition 7.3, which includes improved features and functionality to help organizations meet their growing needs for protecting …

36 credit card fraud websites taken down

36 website domains, used to sell compromised card data, have been taken down following a day of action on Wednesday to target online criminals by SOCA working with the FBI and …

Majority of web apps vulnerable to most frequent exploits

84 percent of web applications from public companies were deemed unacceptable when measured against the OWASP Top 10 most frequently exploited web application vulnerabilities, …

Don't miss

Cybersecurity news