Please turn on your JavaScript for this page to function normally.
Personalized cloud-based platform

NetQin announced a personalized cloud-based platform that allows users to synchronize their personal data across multiple devices with single account. Backed by a cloud …

Vulnerabilities in common web applications escalate

A new Cenzic report reveals widespread Web application vulnerabilities, with 2,155 discovered – a third of which have both no known solution and an exploit code publicly …

Cybercriminals and their favorite baits

According to PandaLabs research, 25 percent of sites used video and multimedia content as bait; 21.63 percent referred to installers or program updates; 16.53 percent claimed …

Half of U.S. tax payers are unaware about identity theft risks

While consumers take steps to protect themselves against identity theft and remain concerned about the possibility of a data breach when sharing their personal information, …

Vulnerabilities surge: 8,000 recorded in 2010

IBM today released results from its annual X-Force 2010 Trend and Risk Report, highlighting that public and private organizations around the world faced increasingly …

Key security experts unfamiliar with DNSSEC

Half of IT personnel in charge of Internet security at the world’s largest organizations either haven’t heard of DNSSEC or have limited familiarity with it, …

Tips for protecting against advanced evasion techniques

By challenging the rules of traditional evasion techniques and combining multiple evasions, AETs are currently unable to be detected by existing network security systems. Ted …

Application control within virtual environments

Sourcefire announced integration between Sourcefire and VMware vShield App and vShield Edge. The integrations enable the Sourcefire Intrusion Prevention System (IPS) to …

Cisco ACS unauthorized password change vulnerability

A vulnerability exists in some Cisco Secure Access Control System (ACS) versions that could allow a remote, unauthenticated attacker to change the password of any user account …

ICSA Labs reveals electronic health record testing program

ICSA Labs unveiled a new certification program for electronic health record systems and has certified the first three products in two domains under the program. ICSA Labs …

Harvest geolocation user info with Creepy

Creepy is an application that allows you to gather geolocation related information about users from social networking platforms and image hosting services. The information is …

The need for data encryption in the cloud

Recent Microsoft research shows that almost two-fifths of companies will start paying for cloud services within three years. Cloud-using firms need to revisit their encryption …

Don't miss

Cybersecurity news