Please turn on your JavaScript for this page to function normally.
Are cyber attacks more dangerous than physical attacks?

Eighty percent of C-level executives and IT security professionals believe that cyber attacks pose a greater risk to their nation than physical attacks, while 51 percent …

Creating a cloud security policy

Building a cloud security policy is a crucial step to take before diving into the cloud to ensure maximum benefits are achieved and data is secure. But some organizations, in …

Firefox 22 delivers 14 security updates

Mozilla released Firefox 22, which includes 14 security updates: four are critical, six high, three moderate and one low. Fixed in this version: MFSA 2013-62 Inaccessible …

AirWatch enhances laptop management solution

AirWatch announced enhancements to its laptop management solution that provides additional functionality and platform support for organizations that need to manage all of …

Private, secure texting app for iOS

With an estimated 6 billion text messages sent every day in the United States alone, text messaging has become the primary means of communication for a large portion of the …

SMBs are embracing cloud-based services

Cloud-based applications are forcing SMBs to balance IT requirements with employees’ needs for anytime, anywhere access to information, according to Spiceworks. …

Lulzsec hacker Davis freed, back on the Internet

Jake Davis (aka Topiary), the former Lulzsec hacker and spokesman, has been released from the Feltham Young Offenders’ Institution, where he spent 37 days following his …

Car hack attack a possible theory behind journalist’s death

The upcoming DEFCON hacking conference will have many presenters touching on a great number of subjects, including that of car hacking. Security researcher Charlie Miller, …

New specific rules target EU telecoms that lose personal data

The European Commission is putting into place new rules on what exactly telecoms operators and ISPs should do if their customers’ personal data is lost, stolen or …

U.S. senators propose new privacy bill following surveillance scandal

A group of U.S. senators lead by Senator and Chairman of the Senate Judiciary Committee Patrick Leahy have introduced a new legislation that aims to improve government …

Researchers reveal tricks for Cutwail’s endurance

While some botherders have opted for the arguably much safer P2P architecture in order to assure their botnets’ resilience, others are still clinging to the standard …

Dell Software tackles the risk of software compliance

The Dell KACE K1000 Management Appliance now includes integrated software asset management to boost software licence compliance. With this latest release, the K1000 simplifies …

Don't miss

Cybersecurity news