CSOs must adopt new risk management trends
Wisegate released new research from senior IT security members that shows how CSOs are adopting new risk management trends calling for a risk-based security approach. Security …
Adobe patches Flash again, but not the flaws exploited at Pwn2Own
As promised last year, Adobe has been issuing its scheduled Flash updates on the second Tuesday of each month – the same day that Microsoft chose for its monthly Patch …
(IN)SECURE Magazine issue 37 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 37 has been released today. Table of contents: …
Metasploit supports Kali Linux free security auditing toolkit
Rapid7 is working with Offensive Security to provide official Metasploit support for Kali Linux, the enterprise-ready evolution of BackTrack Linux. The free security auditing …
Tips for removing data from mobile devices
AVG released tips on how consumers can remove their personal data before they recycle or throw away their old smartphones. In an era of frequent and seamless device upgrades, …
Who are the enemies of the Internet?
In their latest report on online surveillance, Reporters Without Borders have named Bahrain, China, Iran, Syria and Vietnam as “state enemies” of the Internet due …
Microsoft releases four critical bulletins
In terms of volume, the March Patch Tuesday is about average, with seven bulletins — four rated “critical” and three rated “important.” In …
Trend Micro introduces new end user protection suite
Trend Micro announced a new suite – Trend Micro Enterprise Security and Data Protection – designed to help companies efficiently mitigate the risks of attacks and …
Zoosk asks users to reset passwords following mass leak
Online dating service Zoosk is urging some of its users to change their passwords following the leaking of a list of some 29 million passwords that seemingly contains theirs. …
First direct silicon-to-photonics-based router family
Compass-EOS announced r10004, the first in a family of next-generation, core-grade modular routers. The r10004 is three times smaller than comparable core routers and supports …
Hackers steal, leak financial info of U.S. celebrities and politicians
Detailed personal and financial information of a number of U.S. celebrities, politicians and a chief of police has been made public by hackers, TMZ reports. The victims of the …
2013 will be the year of larger scale big data adoption
After a few years of experimentation and early adopter successes, 2013 will be the year of larger scale adoption of big data technologies, according to Gartner, Inc. According …
Featured news
Sponsored
Don't miss
- Authentik: Open-source identity provider
- Hide yo environment files! Or risk getting your cloud-stored data stolen and held for ransom
- Critical RCE bug in SolarWinds Web Help Desk fixed (CVE-2024-28986)
- How passkeys eliminate password management headaches
- Delta vs. CrowdStrike: The duties vendors owe to customers – or do they?