Please turn on your JavaScript for this page to function normally.
Security tips for safer online shopping from mobile devices

47% of employees shopping online will use their company-issued mobile devices: notebook computers, tablets or smart phones. “Digital natives”—ages 18-34, the …

Free tool prevents AutoRun-based malware

Endpoint Protector launched the free AutoRun Disable tool, a solution designed to prevent malware infections spread through USB ports and other computer interfaces and which …

You can do everything right and still be a security attack victim

More organizations now rate information security an upper level priority compared to two years ago, according to a study by CompTIA. But that good news is offset by bad news. …

Most common malware detected on Macs

Recently Sophos launched its free Mac anti-virus for home users which now has 150,000 active users and Sophos has analyzed the most commonly encountered malware that Mac users …

Online backup Mozy 2.0 for Mac released

Mozy 2.0 for Mac is now available. With improved features and a native-Mac experience, it makes it easier and faster for Mac users to run and monitor backups and restores …

Cloud-based crack of SHA-1 passwords is a taste of things to come

Reports that a German hacker has successfully cracked a secure hashing algorithm (SHA-1) password using a pay-as-you-use cloud computing based parallel processing environment …

Vast majority of organizations continue to adopt encryption

For the first time regulatory compliance has surpassed data breach mitigation as the top reason why organizations deploy encryption technologies, according to Ponemon …

Dell releases endpoint encryption solution

Dell today announced Data Protection | Encryption, a flexible, manageable and auditable endpoint encryption solution. The solution is designed to help companies protect …

E-commerce and online gaming phishing attacks surge

Phishing attacks through impersonation of e-commerce sites and gaming companies increased significantly year-over-year around the world in the third quarter of 2010, according …

Google Chrome tops “Dirty Dozen” apps list

Bit9 unveiled its report of the top applications with reported security vulnerabilities in 2010. Google Chrome placed first on the “Dirty Dozen” list, followed by …

Tool finds why specific firewall rules exist in enterprise networks

Athena Security released Firewall Rule Tracker, an asynchronous documentation solution for recording the reason why specific firewall rules exist in enterprise networks. While …

Rogue e-mail makes Swiss bank lose millions?

Reports that a rogue e-mail generated by a Swiss bank employee has cost the organization around £6.2 million in lost business highlights the problem of data leakages …

Don't miss

Cybersecurity news