Please turn on your JavaScript for this page to function normally.
Network Intrusion Analysis

What happens after a network intrusion is detected? What steps do you need to take? What is the proper way to react in a specific situation? The authors say their intention …

StealthWatch gets enhanced threat detection

Lancope released the latest version of its StealthWatch flow-based monitoring system to enable faster, more effective threat detection and incident response. With StealthWatch …

App turns a mobile device into a personal authenticator

Passwords are at the root of online security problems because when typed into browsers, sent over open networks and centrally stored, they are easily compromised leaving the …

Audit privileged access to Microsoft Online Services

Xceedium announced Xsuite will include protection for Office 365, Exchange, Lync, and SharePoint. The additional protection for Microsoft online services complements …

US Emergency Alerting System vulnerable to attack

IOActive has discovered vulnerabilities in the Emergency Alerting System (EAS) which is widely used by TV and radio stations across the United States. They uncovered the …

Super-scalable LDAP directory driven by big data

Radiant Logic announced a commercial solution for distributed storage and processing for enterprise identity management. Based on Hadoop, this new highly-available version of …

Jon Callas on privacy in the modern age

In this interview, Jon Callas, co-founder of PGP and current CTO at Silent Circle, discusses the global erosion of privacy and the importance of confidentiality. He tackles …

Protect Android devices from theft and malware

The new Norton Mobile Security with antivirus protects your Android phones and tablets from theft, loss, malware and viruses. Remotely locate your lost or stolen device. Scan …

Keep all your software up-to-date with F-Secure

The month of June saw security updates for well over 100 vulnerabilities in just the most commonly used software for Windows workstations, with each of these vulnerabilities …

Android hack tool harvests info from PCs

Stealing information is a piece of cake if you can manage to get malware on the target’s Windows computer, but did you know that it can also be as easy as connecting …

Abuse of mobile app permissions

McAfee Labs found that under the camouflage of “free” apps, criminals are able to get consumers to agree to invasive permissions that allow scammers to deploy …

Explore, analyze and visualize data in Hadoop

Splunk announced the beta version of Hunk: Splunk Analytics for Hadoop, a new software product that integrates exploration, analysis and visualisation of data in Hadoop. Hunk …

Don't miss

Cybersecurity news