Please turn on your JavaScript for this page to function normally.
Spike in suspicious traffic and TOR usage, says threat report

Solutionary has released its Security Engineering Research Team (SERT) Quarterly Threat Intelligence Report for Q3 2013, providing intelligence on key security threats …

Solving network security complexity with automation

Network security has become too complex to manually manage, and companies should consider automation and orchestration in order to increase IT agility while maintaining …

Exposing unknown threats with mathematical science

Cylance announced today the official worldwide release of CylanceV, a new cloud and on-premise solution to find what others miss in detecting advanced malware. CylanceV …

Counterfeit money detector easily hacked to accept fake money

A lot of simple electronic devices that we use every day can be easily hacked, because security has for a long time been at the very bottom of the list of things to care about …

Sophos delivers cloud-based endpoint security

Sophos announced Sophos Cloud, an easy to use security service that provides essential protection for today’s advanced threats. This first version of Sophos Cloud …

Russia handed malware-laden devices to G20 delegates?

At the G20 summit held near St. Petersburg in September, attending delegates representing the 20 most powerful nations in the world have been handed gifts that included …

Microsoft details risks of running unsupported software

Microsoft published their Security Intelligence Report (SIR) volume 15, which analyzes threat intelligence from more than 1 billion systems worldwide to provide in-depth …

Obama orders NSA to stop spying on UN diplomats

There is nothing wrong with spying on foreign national leaders, even when they are allies, said NSA head General Keith Alexander and NI director James Clapper at a hearing …

Women crucial for taking infosec industry to next level

Women represent only 11 percent of the information security workforce yet they have the academic background and diverse perspective necessary to accelerate change in the …

When the phone call is more dangerous than malware

During Social Engineer Capture the Flag contest, one of the most prominent and popular annual events at DEF CON 21, a pool of 10 men and 10 women, from diverse backgrounds and …

Secure corporate BYOD solution by ForeScout

ForeScout Technologies announced interoperability between ForeScout CounterACT network security and SAP Afaria mobile device management (MDM) platforms. The combination …

RSA takes a big data approach to help with high-risk threats

RSA, The Security Division of EMC, at RSA Conference Europe 2013 unveiled RSA Vulnerability Risk Management (VRM), a new software solution designed to help organizations …

Don't miss

Cybersecurity news