Please turn on your JavaScript for this page to function normally.
Is data fragmentation putting businesses at risk?

IT managers believe that fragmentation of corporate data across their IT infrastructure and an emerging “Shadow IT’ network of user devices or consumer cloud …

Cloud security for Windows, Android and iOS

Boxcryptor, the cloud-optimized encryption software, has been updated to version 2.0. The new version includes increased usability as well as features for secure …

Windows 8.1 will allow locking folders with a finger

Windows 8.1 is scheduled to be released at the end of 2013, and among the various changes that Microsoft aims to implement in it is native support for fingerprint readers, so …

The need for a collaborative effort against cybercrime

It has been revealed that NATO experienced 2,500 cyber attacks in 2012. Though an official stated that none of the attacks had successfully infiltrated NATO security, it has …

Most businesses experienced a mobile security incident

79% of businesses had a mobile security incident in the past year, in many cases incurring substantial costs, according to Check Point. The report found mobile security …

Internet-savvy Turkish protesters turn to anti-censorship apps

In the months leading up to the current protests in Turkey, its government has been censoring content on Twitter and Facebook, as well as throttling and blocking access to …

Spyware sold to foreign governments aimed at U.S. woman critical of Turkish movement

A failed phishing attempt aimed at an unnamed woman openly critical of the G??len Movement has revealed that spyware created for lawful intercept purposes is being used for …

Cyberespionage campaign targeting government-affiliated organizations

Kaspersky Lab experts published a new research report about NetTraveler, which is a family of malicious programs used by APT actors to successfully compromise more than 350 …

Net neutrality soon to be on EU’s agenda

Lack of regulation has contributed much to the success of the Internet, and made it a hotbed for new ideas. But there are some things that should be regulated and enforced in …

Apple releases OS X 10.8.4

The OS X Mountain Lion 10.8.4 Update is recommended for all OS X Mountain Lion users and includes features and fixes that improve the stability, compatibility, and security of …

Damballa now detects malicious P2P communications

Damballa Failsafe can now discover malicious P2P communications. It uses behavioral detection techniques to identify malicious P2P communication attempts from malware trying …

Online password manager for business

Zoho launched Zoho Vault, the secure online password manager for teams and businesses. It establishes a central repository that offers unmatched security and complete data …

Don't miss

Cybersecurity news