Please turn on your JavaScript for this page to function normally.
Hijacking airplanes with an Android phone

An extremely well attended talk by Hugo Teso, a security consultant at n.runs AG in Germany, about the completely realistic scenario of plane hijacking via a simple Android …

Beyond BYOD: Companies need to change

Organizations seeking to maximize the economic and productivity benefits made possible by mobile technologies must look beyond simply which devices are used and re-examine …

Risks to retailers through point of sale systems

McAfee released a report on the growing risks the industry is facing with both legacy and newer point of sale systems (POS). The report discusses how the retailing …

Secure Microsoft Office collaboration via any device

WatchDox Apps for WatchDox Enterprise and Enterprise ES is the first offering to grant enterprise users secure Microsoft Office collaboration capabilities via any desktop, …

Global technology supply chain security standard released

The Open Group published of the Open Trusted Technology Provider Standard (O-TTPS), the first complete standard published by The Open Group Trusted Technology Forum (OTTF) and …

Use your iPhone for biometric scanning

AOptix unveiled AOptix Stratus, the first comprehensive mobile identity solution “Made for iPhone” delivering iris, fingerprint, voice, and face recognition in a …

Solera Networks offers visibility into potential security breaches

Solera Networks unveiled the DeepSee BlackBox Recorder, which continuously and silently captures all network traffic – including packets, flows, files and applications. …

Microsoft patches 13 vulnerabilities

April has turned out to be a rather slow month for Patch Tuesday. There are nine bulletins addressing a total of 13 vulnerabilities, but only two of the bulletins are rated …

Malicious HP scan notifications target employees

Users are once again being targeted with fake notifications about a scanned document, but instead of attaching a malicious file to the email, malware peddlers have opted for …

How simulated attacks improve security awareness training

Wombat released a new report that discusses how simulated phishing attacks can be an effective security awareness and training tactic to help companies educate employees how …

UK to host global cybersecurity centre

Foreign Secretary, William Hague, has announced plans to open the Global Centre for Cyber Security and Capacity Building at the University of Oxford – something that he …

LANDesk Acquires VMware Protect product family

LANDesk Software has acquired VMware’s Protect product family of IT management solutions, which VMware acquired through its purchase of Shavlik Technologies in 2011. The …

Don't miss

Cybersecurity news