Please turn on your JavaScript for this page to function normally.
Week in review: Study of hacker forums, creating effective CAPTCHAs, and trust relocated for yet another CA

Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: Irresponsible IT disposal methods Although data security is the …

Focusing on new technologies instead of security threats

In the rush to utilize new technologies and move into the increasingly borderless world of cloud computing, mobile devices and social media, a growing gap is developing …

Most firms don’t coordinate security planning

Despite the potentially crippling impact of security events on corporate performance, many executives report that their security function is not well coordinated with …

New analytics advance IBM security intelligence portfolio

IBM is extending its proven security services portfolio to include enhanced analytic tools and services to provide deeper, real-time analysis of advance threats. By detecting …

IT Operations Analyzer gets expanded monitoring capabilities

Hitachi announced a new version of its IT Operations Analyzer, an integrated availability and performance monitoring tool that can help reduce complexity, streamline …

Unique malware URLs increased 89 percent

Websites loaded with malware increased a massive 89 percent in the third quarter compared to Q2 2011. According to an IID report, the most impersonated organizations include …

Five million new malware samples

In the third quarter of 2011 alone, five million new malware samples were created. In addition, Trojans set a record for becoming the preferred category for cybercriminals to …

First joint EU-US cyber security exercise

The first joint cyber security exercise between the European Union and United States is being held today in Brussels, with the support of the EU’s Network and …

Managing firewall risks in the cloud

67 percent of IT security respondents in a Ponemon Institute study, report that their organization is very vulnerable or vulnerable because cloud ports and firewalls are not …

Registry Decoder: Digital registry forensics

Registry Decoder is a free and open source tool for the acquisition, analysis, and reporting of registry contents. It comes with an online acquisition component and an offline …

Norton updates Tablet Security and Mobile Security

Symantec announced Norton Tablet Security and new updates for Norton Mobile Security, including a new “Scream” feature that helps users find a lost or stolen phone …

The value of digital content

Although 51% of Americans have experienced a computer crash where they lost all of their digital files, more than one-third (39%) admit they have never backed up their …

Don't miss

Cybersecurity news