Please turn on your JavaScript for this page to function normally.
2013: The year of cyber war or just cyber panic?

At the end of the year experts at G Data SecurityLabs are taking a moment to look both back and forward at IT security, attacks and cyber crime. In 2012, online criminals were …

Scarlett Johansson hacker gets 10 years in prison

36-year-old Florida resident Christopher Chaney has been sentenced to 10 years in prison and to pay $66,000 restitution for having hacked the email accounts of Scarlett …

Top 7 security predictions for 2013

A seismic shift in who controls the Internet? Another Mac malware outbreak? Your smart TV being highjacked for a DDoS attack? Whatever 2013 may bring, it’s sure to be an …

McAfee mobile security app gets new privacy technology

McAfee released an enhanced version of McAfee Mobile Security featuring App Lock, an app privacy technology, as well as a completely refreshed user interface. The security …

Secure iOS file transfers with QuickDrop

CloudPrime announced QuickDrop, a safe way to communicate and send files of any type between mobile devices. It is available immediately for iOS, and will be available for Mac …

IAM solution for secure email on iOS devices

Good Technology introduced Good Vault, built on the Good Trust mobile identity and access management (IAM) platform. Good Vault extends strong two-factor authentication and …

Wireless LAN platform for mobile application delivery

Aruba Networks announced a new wireless LAN platform that addresses the explosion of mobile applications and devices challenging enterprise networks, while dramatically …

Risk study identifies top pain points in 2013

The state of endpoint risk is not improving according to the fourth annual report researched by the Ponemon Institute. IT professionals reported the flood of mobile devices …

Three major impacts when moving to a BYOD policy

Seventy percent of respondents in a recent survey by Gartner, Inc. said that they have or are planning to have BYOD policies within the next 12 months to allow employees to …

Employees use file sharing services despite bans

Large numbers of employees use Dropbox and other consumer file sharing services for sensitive work-related data, even if they know that their employer has a specific policy …

Mobile and cloud developments will dominate 2013

For the past several years, the IT industry’s transition to the 3rd Platform, built on mobile computing, cloud services, social networking, and big data analytics …

Mobile communications hub with embedded encryption

API Technologies announced the new SST Secure Communications Hub (SCH) with integrated encryption. The SB1500ER Secure Communication Hub is a single, integrated device that …

Don't miss

Cybersecurity news