Please turn on your JavaScript for this page to function normally.
Keycard: Unlock your Mac using an iOS device

Keycard allows you to pair your iPhone or other Bluetooth enabled device with your Mac to lock and unlock your computer. It detects when you’re leaving your desk, …

Fraudulent digital certificate for Google web properties used in active attacks

A fraudulent digital certificate that could be used to spoof content, perform phishing attacks, or perform man-in-the-middle attacks against several Google web properties has …

Secure stateless tokenization for enterprises

Voltage Security announced its Stateless Tokenization (SST) technology, a patent-pending data security solution that provides enterprises, merchants and payment processors …

Facebook users targeted with bogus Walmart gift card offer

Christmas season should be a happy and relaxed time, but it often isn’t – especially when the money is tight. There are feasts to be planned and presents to be …

Users still have a casual attitude regarding security

A Siber Systems survey of over 700 adults from the United States, the U.K., Germany and other countries shows a significant disconnect between how individuals perceive online …

Most security pros want more desktop privilege control

While the majority of security professionals recognize the importance of limiting administrative rights on corporate desktops and laptops, many organizations continue to lag …

Six threats to watch out for in 2013

FortiGuard Labs revealed its 2013 threat predictions, highlighting six threats to watch out for next year. 1. APTs Target Individuals through mobile platforms APTs also known …

Password handling: challenges, costs, and current behavior

Online passwords are a pain, and not just when you have to type them to access your online bank account or shop at your favorite digital emporium. Password pain extends to the …

Identity and access management with MyAccessLive

Aveksa announced MyAccessLive, a SaaS Identity and Access Management solution. This new offering provides integrated visibility and control of both cloud and on-premise …

IAM solution for secure email on iOS devices

Good Technology introduced Good Vault, built on the Good Trust mobile identity and access management (IAM) platform. Good Vault extends strong two-factor authentication and …

Metaforic releases software protection technology

Metaforic unveiled several new technology advancements that make it easier for software creators to protect a wide range of software (mobile, embedded, desktop, server) …

New consumer authentication service from Visa

Visa announced a new solution in its information products line up to help issuers reduce the risk of eCommerce fraud using real-time, risk-based transaction analysis. Called …

Don't miss

Cybersecurity news