Please turn on your JavaScript for this page to function normally.
Norman antimalware appliance built on Linux platform

Norman announced the latest version of its Network Protection (NNP) antimalware appliance, which improves protection against persistent IT infrastructure security attacks. New …

IT control objectives for cloud computing

Cloud computing has become a major growth area in IT spending, and enterprises must adapt to the changes it brings to maximize the return on investment. To help organizations …

Use Google’s indexing capabilities to identify vulnerabilities

Next week at Black Hat, Stach & Liu researchers Francis Brown and Rob Ragan will show how the power of Google’s indexing capabilities can be harnessed to identify …

What did the RSA breach end up costing EMC?

RSA, the security division of EMC Corporation, has suffered a breach of its networks and the loss of critical data back in March. An initial refusal of sharing details of the …

Half of organizations face downtime due to patching

53 per cent of companies are affected by downtime when it comes to deploying patches, according to Dell KACE. A further 29 per cent of companies had IT teams conduct patching …

AVG releases Premium Security

AVG announced Premium Security, the Internet security solution that surveys the Web for incidents of stolen identity. It includes AVG Identity Alert, AVG Internet Security and …

Phishers becoming sophisticated marketers of fraud

Phishers are becoming more sophisticated criminal marketers, according to a report by IID which documents a quarter that was a watershed for data breaches, from large-scale …

Managers don’t understand the power of IT

While the world is distracted with the continuing reports of phone hacking practices and other corporate data breaches, it is revealed that hundreds of organizations are now …

First OpenStack Infrastructure-as-a-Service cloud solution

Dell announced the Dell OpenStack Cloud Solution, which integrates the OpenStack cloud operating system, cloud-optimized Dell PowerEdge C servers, the Dell-developed …

Samba XSS and request forgery vulnerabilities

Two vulnerabilities have been reported in Samba, which can be exploited by malicious people to conduct cross-site scripting and request forgery attacks. 1. The Samba Web …

22% in US admit to potential abuse of private data

22% of US, 29% of Australian and 48% of British employees who have access to their employer’s or client’s private data, would feel comfortable doing something with …

Phishing attacks on Facebook intensify

There was a significant increase in the amount of phishing attacks on Facebook, as well as other social networking sites such as Habbo in June, according to the latest spam …

Don't miss

Cybersecurity news