Please turn on your JavaScript for this page to function normally.
Funny Facebook video scam leaves unamusing Trojan

A new funny video spreading on Facebook leaves a not-so-hilarious Trojan in its wake on users’ computers, according to research by Bitdefender. The malware, believed to …

What does the future hold for cloud computing?

Positive reports of increasing levels of cloud adoption in the UK were plentiful in the technology media in the first half of 2014. The majority of coverage indicates that …

TRUSTe launches new privacy assessments

TRUSTe expanded its Data Privacy Management Platform to include TRUSTed Assessments, a new privacy assessment solution which addresses the need for specialized tools to …

Week in review: Vulnerable web-based password managers, Mayhem malware, and Google’s Project Zero

Here’s an overview of some of last week’s most interesting news, interviews and articles: Endpoint security myths and why they persist In this interview, Roman …

40% of IT security teams keep executives in the dark

A new survey uncovered the communication challenges between IT security professionals and executives, a desire to overhaul current security systems and limited security …

Are endpoints the most vulnerable part of the network?

Only 39% of companies have advanced endpoint security protections in place even though 74% consider endpoints to be “most vulnerable” to a cyber-attack, and 76% …

Acunetix offers free network security scan

Acunetix is offering 10,000 free network security scans with Acunetix Online Vulnerability Scanner in a bid to make it easier for businesses to take control of their network …

Seagate delivers five new NAS products

Seagate announced five NAS products in a range of capacities from 2TB to 30TB and performance suited for the home office to small businesses with up to 50 employees. The …

How hackers get in: Lessons from a network security audit

Data security is a defining challenge for our time, yet many businesses and other organizations remain under-prepared. The problem stems from numerous sources: lack of concern …

Exposing the insecurity of hotel safes

Travel documents, cash, mobile devices, cameras, jewellery and company documents – on holiday or on a business trip, tourists and business people alike often carry …

63% of businesses don’t encrypt credit cards

In its third study on unencrypted card data, SecurityMetrics found that 63.86% of businesses store the unencrypted 16-digit sequence on the front of credit cards, also known …

Pushdo Trojan infects 11,000 systems in 24 hours

Bitdefender has discovered that a new variant of the Trojan component, Pushdo, has emerged. 77 machines have been infected in the UK via the botnet in the past 24 hours, with …

Don't miss

Cybersecurity news