Please turn on your JavaScript for this page to function normally.
Seven questions you should ask about deduplication

Deduplication has been one of the hottest technologies in the storage industry for almost three years. IT managers in most midrange data centers typically have limited staff …

Increasing security on mobile applications will extend adoption

Many of today’s mobile applications have limited functionality from a lack of overall security, according to a study by Entrust. And for mobile applications that feature …

Apple patches vulnerabilities with new update

Apple released Security Update 2010-005 which increases the stability, compatibility, and security of your Mac. ATS A stack buffer overlow exists in Apple Type Services’ …

Novell releases Cloud Security Service

Novell announced the general availability of their Cloud Security Service which gives cloud providers the ability to deliver secure access and compliance in the cloud for …

Vulnerability research market grows

It is becoming increasingly evident that research on network security is crucial for the protection of critical telecommunications and computing systems. This is especially …

Video: Microsoft DLL hijacking exploit

This is a short video demo of the Microsoft DLL Hijacking Exploit on Windows 7 and office 2007.

Top scams and protection tips

Criminals are always preparing for the next major event from which to hitch a ride and launch an attack in an effort to dupe us into believing their lies. What is it about …

Facebook scam: “I may never text again after reading this”

Sophos is warning Facebook users about a new scam that is spreading quickly across the social network claiming to be a link to an article: Despite similar scams over the past …

Businesses don’t improve security despite increased targeted threats

46 percent of U.S. SMBs have fallen victim to cybercrime, up two percent from last year’s Panda Security survey. The 2010 survey revealed there has been little to no …

New software for smarter security and compliance management

IBM announced new software to deliver security and compliance to thousands of computers globally – automating some of the most time-intensive IT tasks. The new software, …

The first cloud computing solution to achieve PCI compliance

Verizon Computing as a Service, or CaaS, the company’s cloud computing solution is the first cloud-based solution to successfully complete the Payment Card Industry Data …

The dangers of insider threat

Whilst the media seems pre-occupied with the problems of cybercriminals causing problems for organizations from outside their network, a survey just published shows that 23 …

Don't miss

Cybersecurity news