Please turn on your JavaScript for this page to function normally.
LockPath and Qualys partner on risk intelligence

LockPath, a provider of GRC applications, and Qualys, a provider of cloud information security and compliance management solutions, announced an integration partnership to …

Voice analysis technology prevents phone scams

Nagoya University and Fujitsu developed the first technology to analyze phone conversations to automatically detect situations in which one party might “over …

Top U.S. cities for phone loss

The findings from a phone loss study revealed that lost phones, if unrecovered, could cost U.S. consumers more than $30 billion this year. The analysis, from more than 15 …

Top cause of data breaches? Negligent insiders

Negligent insiders are the top cause of data breaches while malicious attacks are 25 percent more costly than other types, according to the Ponemon Institute. The study also …

Surge in mobile exploits and shell command injection attacks

IBM released the results of its X-Force 2011 Trend and Risk Report which shows surprising improvements in several areas of Internet security such as a reduction in application …

Video surveillance on Cisco Unified Computing System

Cisco announced that its Video Surveillance software is available on the Unified Computing System (Cisco UCS) platform, now in use by more than 11,000 customers. Cisco …

Georbot information stealing Trojan uncovered

ESET revealed its analysis of Georbot, an information stealing Trojan and botnet spreading in the country of Georgia. Earlier this year ESET’s global research team …

Mousetrap Trojan steals money by chain reaction

Catalin Cosoi, Chief Security Researcher at Bitdefender warns of a new Trojan that robs your bank account. The new Mousetrap campaign starts with a Java applet that has been …

Mobile forensics and cloud security at SANS Secure Europe 2012

SANS Secure Europe 2012, one of the region’s largest infosec training events will be returning to Amsterdam from 5th to 19th of May with its largest roster of courses …

Risk across the phases of application security

A new Ponemon Institute study surveyed more than 800 IT Security and Development professionals from enterprise organizations to understand the perceptions both groups have …

Tips for backups in virtual environments

With the rate of virtualized servers being added to IT environments, organizations are facing new challenges in how to adequately protect data and ensure its recoverability …

GSM cracking revelations are profound

Commenting on news reports that an Indian company has revealed it can tumble and clone the credentials of mobile phone SIM cards over the airwaves – apparently because …

Don't miss

Cybersecurity news