Lepide Software launches LepideMigrator for Exchange
LepideMigrator for Exchange is a one-stop solution that migrates all user mailboxes, public folders and archive mailboxes along with their content and resources from an …
Third-party security now a top business concern
Forrester found that when it comes to tracking third-party risk, critical data loss or exposure (63 percent) and the threat of cyber attacks (62 percent) ranked as the top …
A proactive approach to DDoS attack prevention
The increase in the frequency, volume and sophistication of DDoS attacks has helped boost the awareness of these threats among Asia-Pacific (APAC) enterprises. New analysis …
What’s the most common security threat for an organization?
IT professionals believe their organizations aren’t doing enough to protect critical data and systems, according to Sungard Availability Services. What is triggering …
How directors manage today’s key challenges
A nationwide survey of nearly 500 directors highlighted that daily risk oversight continues to be one of the central challenges facing boards, as well as an increased focus on …
Flaw in GoPro update mechanism reveals users’ Wi-Fi passwords
A vulnerability in the update mechanism for the wireless networks operated by GoPro cameras has allowed a security researcher to easily harvest over a 1,000 login credentials …
D-Link fixes critical router flaws
D-Link has released new firmware for its DIR-820L Wi-Fi dual band cloud router, which fixes a number of security vulnerabilities. One of these can apparently be exploited by …
Mass infection malware attack targets Android
AdaptiveMobile uncovered one of the single largest messaging-initiated mobile malware outbreaks. The malware, dubbed Gazon, which uses victims’ mobile phone contacts to …
Signal 2.0: Cross-platform encrypted voice and text communication app
Open Whisper Systems has released a new version of Signal, its free, open source iOS app for end-to-end encrypted voice calls. As announced in July last year, when the first …
Phishers target victims of iOS device theft
A clever phishing scheme has been spotted targeting users who have had their iPad or iPhone stolen, leading researchers to believe that it has been set up by a criminal group …
Firewall: The king of network security
A new FireMon report, based on a survey of over 700 network security practitioners, reveals that firewalls remain highly strategic to organizations’ current and future …
Global experiment exposes the dangers of using Wi-Fi hotspots
A global Wi-Fi hacking experiment exposed major security issues regarding the browsing habits of users around the globe. Avast mobile security experts traveled to cities in …
Featured news
Resources
Don't miss
- Google fixes Android vulnerabilities “under targeted exploitation” (CVE-2025-48633, CVE-2025-48572)
- How a noisy ransomware intrusion exposed a long-term espionage foothold
- Creative cybersecurity strategies for resource-constrained institutions
- Product showcase: UserLock IAM for Active Directory
- Cryptomixer crypto laundering service taken down by law enforcement