Please turn on your JavaScript for this page to function normally.
Week in review: Cloud security, patching challenges and RSA Conference 2010 news

Week in review: Here’s an overview of some of last week’s most interesting news, interviews, articles, reviews and podcasts: A foolproof drive-by-download blocking …

BlackBerry patches Enterprise Server

A vulnerability in the BlackBerry Attachment Service component of the BlackBerry Enterprise Server could allow a malicious individual to cause buffer overflow errors, leading …

Requirements of cloud-based network security

While some of the technical underpinnings that make up the cloud’s “secret sauce’, are relatively recent innovations, the business case for managing critical …

5 tips for protecting against spam attacks

Whether you’re at work or at home, spam causes headaches and wastes time, forcing you to trawl through your inbox to work out which mail is legitimate and which is spam. …

How to protect employees with a web filtering solution

Let’s face it, this is not your father’s Internet (or, for those of us who first went online in the late 90’s, even John Postel’s Internet.) As …

One in five spam messages comes from the U.S.

Sophos published the latest report into the ‘Dirty Dozen’ spam-relaying countries, covering the third quarter of 2010. Since the second quarter this year, the spam …

The value of your credentials

As surprising as this may sound, earlier this year stolen twitter credentials were valued at almost $1,000. When compared to credit card details that fetch less than $1, why …

Photos: RSA Conference Europe 2010

RSA Conference Europe 2010 at a glance: keynotes, presentations, mingling on the expo floor.

Portable device management and protection for Mac users

Cososys has released Endpoint Protector 2009, a new version of its device management, endpoint security and data loss prevention solution for Mac/Apple computers. The newly …

Dangers of wireless network use still unknown to many

Nearly half of home wi-fi networks can be hacked in less than five seconds, according to a new study. In an ‘ethical hacking’ experiment conducted across six UK …

Agentless configuration auditing

nCircle announced the new version of its Configuration Compliance Manager, an agentless configuration auditing and file integrity monitoring solution that automatically …

Poor password practices and how to change them

When it comes to safeguarding personal information online, many people leave their virtual keys in the front door. A survey of more than 2,500 people from the United States, …

Don't miss

Cybersecurity news