SSD adoption grows despite difficult data erasure and recovery
The overwhelming majority (82%) of UK CIOs, CTOs and IT managers predict that their use of SSD technology will increase over the next 12 months, according to new research from …
Unisys Stealth for Mobile solution protects against BYOD issues
Unisys announced the Unisys Stealth for Mobile solution to address the security concerns facing enterprises as growing numbers of their employees use consumer devices at work. …
Microsoft exceedes 100 bulletins for 2013
It’s been an interesting month for the Microsoft Security watchers of the world. If your job depends on securing systems running Windows, you should be eagerly awaiting …
Blackhole exploit kit creator arrested
It has been confirmed: the author of Blackhole, the most popular exploit kit out there, has been arrested by Russian authorities. The news that the malware creator that goes …
Avira, AVG, WhatsApp sites defaced by Palestinian hacktivists
The websites of antivirus vendors Avira and AVG, as well as that of popular IM service WhatsApp, have been defaced by Palestinian hackers affiliated with Anonymous that go by …
Will arrests tied to Silk Road put a damper on online drug sales?
The Silk Road shutdown and the arrest of his alleged founder and owner have resonated throughout the Deep Wed and have frightened many of its denizens – but not all. …
Evernote 2-step verification option now available to all users
Some four months after Evernote rolled out the 2-factor authentication feature for paying customers, the company has finally offered the option to the rest of its note-taking …
Microsoft hands out $128k in bug bounties
As the date of the release of the final version of Internet Explorer 11 for Windows 8 and RT draws near, Microsoft has announced that it has paid out over $28,000 to six …
Free secure messaging app from Carnegie Mellon researchers
Carnegie Mellon University CyLab researchers have developed a free smartphone app for iOS and Android users to safely exchange identity data without risk of theft, deception …
Video: Recent advances in IPv6 security
There are a number of factors that make the IPv6 protocol suite interesting from a security standpoint. Firstly, being a new technology, technical personnel has much less …
Users want to access all their content in just one secure place
Are you managing your content, or is your content managing you? An F-Secure survey shows that, with their photos, videos, and other documents scattered across various cloud …
Beginning of a new era: The digital industrial economy
Worldwide IT spending is forecast to reach $3.8 trillion in 2014, a 3.6 percent increase from 2013, but it’s the opportunities of a digital world that have IT leaders …