Please turn on your JavaScript for this page to function normally.
NFC-enabled BlackBerry smartphones will “open doors”

HID Global plans to support the company’s iCLASS digital keys and mobile secure identity on NFC-enabled BlackBerry smartphones. The new BlackBerry Bold 9900/9930 and …

Data mapping and masking requirements

A new study of 3,765 publicly disclosed breach incidents shows they resulted in financial losses of more than $156 billion. Published by the Digital Forensics Association, the …

Data loss management SaaS

Co3 Systems announced an automated, repeatable way to prepare for data loss events, assess their potential impact, and generate and manage incident response plans more …

When scammers socialize

A sophisticated, seemingly broadly orchestrated online scam that promises bogus prizes like iPads or gift cards in order to dupe Internet users into giving up their …

Security case for iPhone 4

BungeeAir is based on a wireless technology that instantly creates a connection between your iPhone and a compact key fob to create a security tether keeping your phone and …

LockDown: USB 3.0 password protected HDD enclosure

Satechi introduced LockDown, a portable external SATA hard drive enclosure that not only keeps your data securely with a encrypted 256-bit AES hardware password protection but …

65% of security pros say SIEM is dead

Two-thirds (65 percent) of senior security professionals at Global 5000 and federal organizations say traditional Security Information and Event Management (SIEM) products no …

phpMyAdmin multiple script insertion vulnerabilities

Multiple vulnerabilities have been reported in phpMyAdmin, which can be exploited by malicious users to conduct script insertion attacks, according to Secunia. 1. Certain …

Trend Micro enhances mobile security for Android

Trend Micro announced Trend Micro Mobile Security Personal Edition, a solution designed to protect Android smartphones and tablets. In January 2011, Trend Micro introduced …

Desktop virtualization approaching tipping point

Cost reduction, security, manageability and simplifying the migration to Windows 7 are driving organizations to adopt an aggressive deployment approach when it comes to …

Majority of small businesses unprepared for data disaster

Although small businesses recognize the impact data loss could have on their business, more than half (57 percent) do not have a disaster preparedness plan for business data. …

BackTrack 5 Wireless Penetration Testing Beginner’s Guide

Wireless technologies are inherently insecure and can be easily broken. BackTrack is a penetration testing and security auditing distribution that comes with a myriad of …

Don't miss

Cybersecurity news