Please turn on your JavaScript for this page to function normally.
Cyberoam launches next-generation firewall appliances

Cyberoam unveiled Next-Generation Firewalls (NGFW) in its NG Series appliances. Cyberoam NGFW come with Layer 8 Identity-based technology for actionable intelligence and …

Week in review: Data broker databases breached, Apple Touch ID hack, and possible solution to click fraud problem

Here’s an overview of some of last week’s most interesting news, reviews and articles: IE 0-day attack reports push ISC to raise official threat level FireEye …

Researchers may have solved the click fraud problem

Click fraud is a considerable drain on the finances of both advertiser and ad networks, but a group of researchers believed that they have managed to create a simple solution …

US intelligence heads speak for FISA preservation

Two opposite forces have clashed in Thursday’s open hearing by the US Senate Intelligence Committee on the subject of potential legislative changes to the Foreign …

NSA letter reveals details of NSA analysts spying on their lovers

Details of twelve recorded cases since 2003 in which analysts misused US intelligence agencies’ surveillance capabilities to spy on their love interest or other not …

Tor-using Mevade botnet is stealthy new version of old threat

The Mevade Trojan and botnet have gained unexpected notoriety when it turned out that the majority of the recent, sudden and massive uptick in Tor users was the result of it …

Legislation aims to end bulk collection of phone records

In order to restore the constitutional liberties that have been eroded by invasive surveillance and end secret interpretations of the law that vastly exceed the intent of …

Challenges faced by top CSOs

(ISC)2 released new data that outlines the chief challenges faced by top enterprise security executives and illustrates the broad range of complex – and sometimes …

Cloud Security Alliance releases Cloud Controls Matrix 3.0

The Cloud Security Alliance (CSA) released the CSA Cloud Control Matrix (CCM) 3.0, the standard for assessing cloud centric information security risks. It expands its control …

Users want a seamless experience in public Wi-Fi

With smartphone and tablet usage continuing to explode, operator-deployed Wi-Fi networks are playing an increasing role in keeping users connected on the go. A new study …

Microsoft, Facebook and Mozilla hunt for developers at HackWEEKDAY

This October, developers from around the globe have an opportunity to showcase their coding skills to an international audience at the HackWEEKDAY hackathon in Kuala Lumpur. …

Cybercriminals exploit most news within 22 hours

Cybercriminals continue to respond with lightning speed when they see an opportunity to exploit a national or global news story to spread malware. In fact criminals are …

Don't miss

Cybersecurity news