Please turn on your JavaScript for this page to function normally.
Global IT-related risk framework

ISACA released Risk IT, the first global IT-related risk framework to provide a comprehensive view of the business risks associated with IT initiatives. Available as a free …

Top 15 most common security attacks

The latest in the Data Breach Investigations Report series by Verizon Business security experts provide a look at the 15 most common security attacks and how they typically …

Advances in surveillance, more attacks on the horizon

Slashed budgets and reduced staffing numbers delayed many security initiatives in 2009, but the vulnerabilities didn’t retreat and will only intensify in 2010, Unisys …

Microsoft releases six security bulletins

In today’s Patch Tuesday, Microsoft delivers 6 bulletins that fix vulnerabilities targeting Windows, Office and Internet Explorer. Jason Miller, Data and Security Team …

Social media a playground for cybercriminals

Cisco today issued its Annual Security Report for 2009, which highlights the impact of social media, particularly social networking, on network security and explores the …

Conficker worm to become a bigger threat in 2010

Although Microsoft offered a $250,000 reward for information leading to the identities of the cybercriminals behind Conficker, the worm continues to wreak havoc. Since its …

Free Wi-Fi network scanner for Windows

inSSIDer is a free Wi-Fi network scanner for Windows Vista and Windows XP. What’s unique about inSSIDer? Use Windows Vista and Windows XP 64-bit. Uses the Native Wi-Fi …

Corporate information security comes under attack

More than ever, information is regarded by business and corporations as a highly valuable, tangible asset. Unfortunately, this value is also recognized by sophisticated groups …

5 key security trends for the next decade

Imperva predicts five key security trends to watch for over the next ten years. 1. The industrialisation of hacking There is a clear definition of roles within the hacking …

Network security IPS with zero-day malware protection

The McAfee Full Spectrum Network Defense solution delivers day-zero malware detection, network threat behavior analysis, and application-level security. The solution includes …

Seagate introduces Pulsar, its first solid state drive

The Seagate Pulsar is a solid state drive (SSD) designed for enterprise blade and general server applications. It uses single-level cell (SLC) technology, delivers up to 200GB …

WPA cloud cracking service for penetration testers

WPA Cracker is a cloud cracking service for penetration testers and network auditors who need to check the security of WPA-PSK protected wireless networks. WPA-PSK networks …

Cybersecurity news