Please turn on your JavaScript for this page to function normally.
Privacy and Big Data

Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what …

Mac OS X Lion 10.7.3 released

The 10.7.3 update is recommended for all OS X Lion users and includes general operating system fixes that improve the stability, compatibility, and security of your Mac. The …

Security breaches driving authentication changes

Recent security breaches and deployment of new technologies are driving organizations to re-evaluate incumbent authentication vendors and re-think their authentication …

Multi-factor authentication for mobile users

DigitalPersona announced the newest version of DigitalPersona Pro Enterprise has support for a variety of new authentication credentials. With the software, organizations can …

Strong network security in the cloud

CloudPassage unveiled Halo NetSec, an automated solution that provides advanced network access control for servers running in public clouds including Rackspace and Amazon EC2. …

Continuous monitoring of network infrastructures

Skybox Security announced Skybox Network Assurance 6.0, a solution for continuous monitoring of network infrastructures. New versions of FFIEC, PCI, FISMA and other …

Mac Kung Fu: Over 300 Tips, Tricks, Hints, and Hacks for OS X Lion

After you’ve uncovered the basics in Lion, Mac Kung Fu is your next step. You’ll learn how to master everyday tools such as the Dock, Spotlight, Mission Control, …

HITBSecConf2012: New hackathon, CTF and high-profile keynotes

Hack In The Box Security Conference is back again in Amsterdam this year for the European leg of its annual circuit. From the 21st to the 25th of May, this deep knowledge …

Millions of infected Android apps… or not?

Over the weekend, several websites picked up Symantec’s story about Trojanized apps on the official Android Market. This happens from time to time, but what got …

Cisco updates switching portfolio

According to the Cisco Cloud Index, more than 50 percent of computing workloads in data centers will be cloud-based by 2014, and global cloud traffic will grow more than 12 …

Malware redirects bank phone calls to attackers

Trusteer have discovered a concerning development in some new Ice IX configurations that are targeting online banking customers in the UK and US. Ice IX is a modified variant …

Detecting the DNS Changer malware

January marked half-time for the folks at the DNS Changer Working Group (DCWG) who are now running the DNS servers originally used in the Rove botnet. Ever since a …

Don't miss

Cybersecurity news