Please turn on your JavaScript for this page to function normally.
Employees biggest IT threat to businesses

Despite British small and medium sized enterprises (SMEs) providing training in IT and security, employees fail to prevent breaches and data leaks, according to McAfee. Even …

Facebook once again accessible via Tor

For several hours on Tuesday, regular Tor users have been taken aback by the fact that Facebook was blocking connections from the Tor network. The Onion Router allows users to …

(IN)SECURE Magazine issue 38 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 38 has been released today. Table of contents: …

Google asks secret court permission to publish FISA numbers

Google’s open letter to U.S. Attorney General Holder and the Federal Bureau of Investigation chief Muller last week obviously produced some results, but the company in …

Failed backups endanger revenue and productivity

SMBs are losing critical business information as a result of failed backups, and have suffered significant impacts as a result, according to GFI Software. Many IT …

Oracle releases critical security updates for Java

Oracle released 40 new Java security fixes. 37 of the vulnerabilities may be remotely exploitable without authentication. This was described as the possibility of being …

How to detect hidden administrator apps on Android

Following the discovery of a new Android Trojan that uses several errors and vulnerabilities in the Android OS to make analysis harder for researchers and to remain hidden …

CyanogenMod founder aims to thwart data-grabbing apps

There’s some very good news for users of CyanogenMod, one of the most popular modified Android firmware on the market: its founder and main developer Steve Kondik (aka …

Bill aims to regulate email privacy in the cloud

Texas Governor Rick Perry has signed and thusly put into effect HB 2268, a bill that legislates that law enforcement agents must get a search warrant to access …

Businesses not fully implementing infosec programs

Many U.S. small businesses are taking a passive approach when it comes to protecting their data leaving themselves vulnerable to data loss and possible financial and …

The security of WordPress plugins

Checkmarx’s research lab identified that more than 20% of the 50 most popular WordPress plugins are vulnerable to common Web attacks, such as SQL Injection. Furthermore, …

Free anti-spam software for the Mac

Cloudmark announced the latest version of Cloudmark DesktopOne for Mac, an anti-spam solution that users can use to filter email to eliminate messaging threats, protecting …

Don't miss

Cybersecurity news