Please turn on your JavaScript for this page to function normally.
Whitepaper: Still using proxies for URL filtering? There’s a better way

Firewalls enforce network access via a positive control model, where only specific traffic defined in policies is granted access to the network while all other traffic is …

Tips for a safe holiday season

Cyber scrooges leverage all types of digital devices, social media platforms and mobile apps to take advantage of consumers’ distraction during this festive and busy …

73% of organizations say BYOD increases security risks

Findings from a Kensington survey on the security risks created by BYOD policies in the enterprise show that 73 percent believe that BYOD represents greater security risks for …

German spy agency wants to buy and use 0-day bugs

The Bundesnachrichtendienst (BND) – Germany’s Federal Intelligence Service – has asked a parliamentary oversight committee for big money to buy …

First victims of the Stuxnet worm revealed

After analyzing more than 2,000 Stuxnet files collected over a two-year period, Kaspersky Lab can identify the first victims of the Stuxnet worm. After Stuxnet was discovered …

Personal info of 800,000 USPS employees compromised in breach

The US Postal Service has joined the ranks of private sector companies and governmental agencies that have been breached and had data stolen by hackers. According a statement …

How cybercriminals scam consumers during the holiday season

McAfee announced its annual “12 Scams of the Holidays” list, which includes the most popular ways cybercriminals scam consumers during the holiday season as they …

Only 47% of IT pros are confident in their hardware configurations

Respondents of a new Tripwire survey were asked about the level of confidence they have in their application of foundational security controls, including hardware and software …

8 criteria to decide which ISO 27001 policies and procedures to write

If you’re just starting to implement ISO 27001 in your company, you’re probably in a dilemma as to how many documents you need to have, and whether to write …

New SDK for Raspberry Pi protects embedded software

Wibu-Systems is about to introduce a Raspberry Pi version of its CodeMeter software protection platform called Compute Module. A CodeMeter SDK for the Raspberry Pi will enable …

Obama backs net neutrality, asks FCC to reclassify broadband as a utility

The US president has sided with net neutrality advocates and has encouraged the Federal Communications Commission (FCC) to reclassify consumer broadband service from a …

BrowserStack hacked, but it’s not shutting down

BrowserStack, the popular cross browser testing service used by over 25,000 customers around the world, including Microsoft, eBay, Adobe, Wikipedia and many others, has …

Don't miss

Cybersecurity news