Please turn on your JavaScript for this page to function normally.
Volume and sophistication of attacks to increase

Based on activity levels observed in the second half of 2011, the growing pace, volume and sophistication of attacks suggest consumers, small businesses and corporations will …

Identity intelligence and the complexity of security

An employee’s unauthorized access to client information can leave a firm vulnerable to security breaches and audits. Many companies juggle the administration of …

Secure web gateway protection from Sophos

Virtualization has helped organizations reduce capital and operating costs, while driving greater levels of application availability. It has also yielded benefits in …

Microsoft SharePoint 2010: Deploying Cloud-Based Solutions

Take your Microsoft SharePoint solutions to the cloud and gain scalability and high availability while helping to lower your operational costs. Led by a SharePoint expert, …

FreeBSD 9.0 released

The FreeBSD Release Engineering Team is announce the availability of FreeBSD 9.0 that adds many new features. The release is now available for the amd64, i386, ia64, powerpc, …

Ramnit not actually a Facebook worm

Last week, information surfaced about a new version of Ramnit, which had stolen some Facebook credentials. Most people understood that to mean that there was a new Facebook …

Retailers increasingly considering biometric authentication

More than half of retailers still use passwords for point-of-sale (POS) system login, despite concerns over the sharing and misuse of those passwords, according to …

Samsung introduces suite of security features for Android

The Samsung Galaxy Note and Galaxy Tab 7.7 will be the first Samsung Approved for Enterprise (SAFE) devices provided to consumers who wish to use their own mobile devices in …

Highly secure cloud-based collaboration

Exostar announced ForumPass 5, a multi-enterprise project collaboration service offering built on Microsoft SharePoint 2010. It operates within Exostar’s Community …

The anatomy of the Gameover Zeus variant

The “Gameover” malware is a relatively new, “private” version of ZeuS. Support for the distributed command and control (C2) tools, integrated into the …

Easy ways to protect your privacy and data

In spite of one high profile computer security breach after another, many people are still not employing even the most basic safeguards to protect their privacy and their …

Dell delivers new storage backup

Dell announced advancements in its Fluid Data architecture that enable customers to quickly adapt to the changing demands of their organizations and increase automation for …

Don't miss

Cybersecurity news