Please turn on your JavaScript for this page to function normally.
Big data spending to reach $114 billion in 2018

Global spending on big data by organizations will exceed $31 billion in 2013, finds a new market forecast by ABI Research. The spending will grow at a CAGR of 29.6% over the …

Secure mobile managed file transfer with MOVEit

Ipswitch File Transfer released MOVEit 8.0 – a software package that enables mobile workers to transfer files as part of key business processes, while providing IT the …

Microsoft releases 13 bulletins, axes .NET patch

September’s Patch Tuesday is live! The 14 bulletins predicted have been cut to 13, with the .NET patch landing on the cutting room floor. A patch getting pulled after …

C&C PHP script for staging DDoS attacks sold on underground forums

Earlier this year, US-CERT has deemed it important to release an alert about publicly accessible open recursive DNS servers that are increasingly being used in DNS …

EU politicians want to suspend banking data-sharing program

Following the claims that the NSA has spied on the Belgian-based Society for Worldwide Interbank Financial Telecommunication (SWIFT) – the organization that provides the …

Fake AVG AV apps offered on Google Play

However hard Google works to prevent malicious apps from being offered on Google Play, its official online Android market, some always get through. AVG researchers warn about …

Phishers use free iPhone 5S as lure ahead of launch

As the moment when Apple is set to unveil its latest offerings slowly approaches and it seems almost sure they will show several version of iPhone 5, cyber scammers are trying …

Security heavyweights to keynote HITB conference in Malaysia

This October, both Chief Security Officers of Akamai and Facebook will be in Kuala Lumpur to deliver their Day 1 and Day 2 keynote talks at HITBSecConf 2014 (October 16th and …

Timing is an influential risk-factor for cyber attacks

There are several dates throughout the year that are notorious for wreaking havoc on businesses via DDoS attacks, data breaches and even malware or botnet assaults. According …

HyTrust Appliance gets role-based monitoring

HyTrust released HyTrust Appliance 3.5, which enables enterprises to virtualize mission-critical applications and deploy multi-tenant private clouds. This solution for policy …

Appthority unveils app risk and policy management solution

Appthority announced an all-in-one app risk management solution combining app reputation analysis with a new policy management functionality, enabling organizations to create …

Executives, IT officers most concerned about malicious insiders

An international survey polling 260 respondents from a wide variety of industry sectors has revealed that over half of them are more worried about their own employees turning …

Don't miss

Cybersecurity news