Please turn on your JavaScript for this page to function normally.
Mobile app for single sign-on access to thousands of applications

Ping Identity announced a native mobile application that delivers single sign-on (SSO) access to thousands of applications from any device. Available for iOS and Android, the …

CERN, MIT scientists launch Swiss-based secure webmail

Last week marked the beta release of yet another encrypted, secure email service, and interest for it was so overwhelming that its developers had to temporarily close the …

Sophisticated Google Drive phishing campaign persists

Symantec researchers are once again warning about a sophisticated and persistent phishing campaign targeting Google users. The victims are hit with fake emails sporting a …

Still no patch for 7-month-old IE8 zero-day flaw

HP’s Zero Day Initiative has published details about a zero-day vulnerability affecting Microsoft Internet Explorer 8 which the Redmond giant apparently has no intention …

OnionShare lets you send files securely and anonymously

A new programming project that allows users to send files anonymously over Tor has been made available on GitHub by its author Micah Lee, former staff technologist at the EFF …

PayPal fixes merchant account hijacking bug

Well-known and prolific bug hunter Mark Litchfield has unearthed a pretty big flaw in PayPal Manager, which would allow attackers to hijack a merchants’ account by …

What are the biggest risks with the Internet of Things?

The majority of small businesses in the U.S. (82 percent) believe the Internet of Things (IoT) will bring fresh opportunities for their business, according to a new study …

Reactions to the eBay breach

A database containing eBay customers’ name, encrypted password, email address, physical address, phone number and date of birth was compromised. Here are some of the …

More enterprises to adopt multi-factor authentication

Rising security risks, and demand for seamless and secure access across any device, anytime, has triggered greater adoption of authentication solutions. A new SafeNet survey …

Hybrid cloud computing success factors

In the past three years, private cloud computing has moved from an aspiration to a tentative reality for nearly half of the world’s large organizations. Hybrid cloud …

Company and employee disconnect on BYOD security policies

Many employees do not take adequate steps to protect company information, a weakness that could result in critical security breakdowns, according to Webroot. Key findings: …

Stop all browser-borne malware from entering your network

In this podcast, recorded at Infosecurity Europe 2014, Branden Spikes, CEO, CTO & Founder of Spikes Security, talks about how malware has already done its job by the time …

Don't miss

Cybersecurity news