Are tablets secure enough for business?
Amazon is launching its first enterprise-ready tablet. A smart move, as the much-loved mobile device can finally be integrated into business. However it does beg the question, …
What e-commerce companies think about DDoS protection
Prolexic announced the results of a survey of global e-commerce companies who were asked about DDoS protection and the effectiveness of different types of DDoS mitigation …
SAP Trojan based partially on Carberp code
Bit by bit, details about the first information-stealing Trojan discovered targeting SAP enterprise software are being unveiled, and Microsoft researchers have tied at least …
Researcher offers new perspective on Stuxnet-wielding sabotage program
Stuxnet, the malware that rocked the security world and the first recorded cyber weapon, has an older and more complex “sibling” that was also aimed at disrupting …
Green light given to Galileo, the EU alternative to America’s GPS
Plans to start up the EU’s first global satellite navigation system (GNSS) built under civilian control, entirely independent of other navigation systems and yet …
A look at security effectiveness by industry
BitSight analyzed security ratings for over 70 Fortune 200 companies in four industries – energy, finance, retail and technology. The objective was to uncover …
Google encourages teens to contribute to open source projects
For the fourth year in a row, Google has organized its Code-in contest for pre-university students to contribute to open source projects. “For many students the Google …
Data sharing and interoperability are key for mitigating cyber attacks
The EU Agency ENISA launches its new report – Detect, SHARE, Protection on how to make data threat exchange easier and better between the “digital fire …
Secure Dropbox data using a hardware security token
Intrinsic-ID released Saturnus, an application that enables enterprises to protect digital assets stored and shared on Dropbox. With Saturnus, files are encrypted before they …
Bogus “free Bitcoin generator” offer leads to malware
The rising popularity of Bitcoin hasn’t gone unnoticed by online scammers, and according to ThreatTrack’s Chris Boyd, they have started tricking users into …
Best practices for businesses to secure their IT infrastructure
“Tis the season for reflecting on another year’s success, kicking off 2014 planning and preparing for… security attacks? With Cyber Monday and the holidays …
Ruling that authorized NSA bulk email data collection is disclosed
A new batch of declassified documents released by the Obama administration include one ruling made by the then chief judge of the Foreign Intelligence Surveillance Court, with …
Featured news
Resources
Don't miss
- OpenAI’s gpt-oss-safeguard enables developers to build safer AI
- Sanctions won’t stop cyberattacks, but they can still “bite”
- Python Foundation rejects US government grant earmarked for security improvements
- AI agents can leak company data through simple web searches
- Early reporting helps credit unions stop fraudulent transfers faster