Please turn on your JavaScript for this page to function normally.
How cybercriminals are infecting networks

Research by Websense reveals the trifecta that is driving epidemic levels of data theft: 1) extremely effective social media lures 2) evasive and hard-to-detect infiltration …

The importance of ethical hacking

The need for more effective information security practices is increasingly evident with each security breach reported in the media. When adopting new technologies like cloud …

Most IT admins considered switching careers due to stress

67% of IT administrators have considered switching careers due to job stress, according to GFI Software. Managers, users (employees), and tight deadlines were cited as the …

Control and encrypt email with CipherPost Pro

AppRiver unveiled a secure email delivery solution, CipherPost Pro, a service that allows businesses to control and encrypt email and email attachments. CipherPost Pro …

Universal IPsec VPN client for Android 4.0

NCP engineering released a preview version of its IPsec VPN client to support the remote access needs of Android 4.0 (Ice Cream Sandwich) platform users. The NCP Secure …

Businesses unable to comply with EC 24 hour breach notification

UK businesses do not believe they have the capability to comply with new European Commission Data Protection Directive rules, specifically the ability to generate accurate …

ISO 27001/BS 25999-2: The certification process

Obtaining an ISO 27001 or BS 25999-2 certificate is not mandatory, however most of the companies implementing either of these standards want to get certified – the main …

BYOT: Bring Your Own Token

SecurEnvoy revealed details of its latest release that gives users full flexibility of the device they use, while ensuring complete security to the organization. At the click …

MCTS 70-680 Rapid Review: Configuring Windows 7

Assess your readiness for MCTS Exam 70-680—and quickly identify where you need to focus and practice. This practical guide walks you through each exam objective, providing …

Most parents secretly access teens’ Facebook accounts

For generations, parents have been suspicious of teens’ social activities – and have employed any number of tactics to uncover the truth. Today’s parents are …

New York top city for online fraud activity

New York is the nation’s epicenter for online fraudsters, followed by Atlanta, Chicago, Los Angeles, and Omaha respectively. Leveraging a sample of nearly a billion …

New firewall safeguards against medical-device hacking

Researchers at Purdue and Princeton universities have created a prototype firewall to block hackers from interfering with wireless medical devices such as pacemakers, …

Don't miss

Cybersecurity news