Please turn on your JavaScript for this page to function normally.
Cybercriminals are exploiting users of social networking sites

In April, cybercriminals were seen exploiting users of major social networking sites in order to spread malware and spam surveys, according to GFI Software. “In the same …

The personal cloud will eclipse the PC

The personal cloud is poised to eclipse the PC as the hub of consumers’ digital lives by 2014 as rapid growth in the use of apps and services introduces a new paradigm …

Healthcare concerns over data loss increase

While approaches to patient data protection have evolved over the past several years, the aggressive transition to electronic health records (EHR) and the consumerization of …

Webbots, Spiders, and Screen Scrapers, 2nd Edition

There’s a wealth of data online, but sorting and gathering it by hand can be tedious and time consuming. Rather than click through page after endless page, why not let …

Government workers unprotected against visual data leakage

Oculis Labs released results from its “Government Worker Privacy” survey on privacy risks for mobile workers. 104 people were randomly surveyed at this …

IEEE approves revision of wireless LAN standard

IEEE announced the publication of IEEE 802.11-2012, which defines the technology for the world’s premier wireless LAN products. The new IEEE 802.11-2012 revision has …

Ransomware increases in prevalence as cyber-criminal tactic

In the first quarter of 2012 alone, six million new malware samples were created, following the trend of increasingly prevalent malware statistics of previous years, according …

Situational awareness platform uses power of big data

Despite all the promises made by SIEM vendors over the last decade, enterprise security analysts often have no way to know if their IT systems have been compromised by an APT …

Windows applications on iOS

GraphOn announced its GO-Global iOS client. Available immediately as a free downloadable app from the App Store, the new client is used in conjunction with GraphOn’s …

NetShade 5: Anonymous proxy for the Mac

NetShade makes your presence on the web anonymous by routing your connection through a proxy server. It keeps you from leaving your digital “calling card” at every …

Theory of Computation

Offering an accessible approach to the topic, Theory of Computation focuses on the metatheory of computing and the theoretical boundaries between what various computational …

Week in review: Sizing up botnets, Conficker still alive and kicking, and a new exploit kit spotted in the wild

Here’s an overview of some of last week’s most interesting news, podcasts and articles: What’s in your daily slice of spam? Bitdefender decided to look at …

Don't miss

Cybersecurity news