Please turn on your JavaScript for this page to function normally.
Security intelligence through configuration auditing

Modern systems have a multitude of configuration elements that, ideally, meet the IT business requirements of the organization. The danger of having poorly configured systems …

Compliance no longer main driver of security measures

The need to ensure compliance with regulations should no longer be the primary consideration of CIOs when planning IT risk and security measures. Gartner said compliance is an …

Silent Text for Android now on Google Play

Silent Text for Android is now available for download in the Google Play store. It allows you to have secure and encrypted peer-to-peer text conversations on your mobile …

Experienced employees more important than a rising security budget

Tripwire announced the results of a survey of 167 attendees at Black Hat USA 2013. Many of those surveyed – 44 percent – said that if they could change one thing …

Free tool for auditing Google Apps

BeyondTrust released PowerBroker Auditor for Google Apps, available for free, to the BeyondTrust user community. The tool was developed to ease the burdens associated with …

Analyzing the Fort Disco bruteforce campaign

In recent months, several researchers have highlighted an uptick in bruteforce password guessing attacks targeting blogging and content management systems. Arbor ASERT has …

Most companies don’t have data breach cyber insurance

Companies now rank cyber security risks as greater than natural disasters and other major business risks, according to a new Ponemon Institute study. While only 31 percent of …

Compromising Google Accounts and enterprises via flaw in Android SSO

When it comes to Android, Google has traded security for convenience, says Tripwire security researcher Craig Young. During his recent presentation at Def Con in Las Vegas, he …

Twitter turns to app-based two-factor authentication

When Twitter finally offered 2-factor authentication for its users in May, many were disappointed by the offering as its usefulness hinged on verification codes being …

Expect more Android security issues in 2013

Android vulnerabilities, increased online banking threats and availability of sophisticated, inexpensive malware toolkits are among the growing concerns cited in Trend …

IOActive launches security intelligence service

IOActive launched its new Security Intelligence Service, to help arm organizations with prioritized critical security insights based on their business. World-renowned research …

ESET Mobile Security for Android gets an update

ESET rebuilt and redesigned ESET Mobile Security for Android. The next generation mobile product offers improved scanning, Anti-Phishing module and a completely redesigned …

Don't miss

Cybersecurity news