Please turn on your JavaScript for this page to function normally.
What’s the most coveted target for cyber attackers?

Despite repeated warnings, organizations are still failing to lock down the primary target of most cyber-attacks – privileged access points. Cyber-Ark labs analyzed a …

Tips for a safe online shopping season

The holiday season presents the perfect opportunity for cybercriminals to steal consumers’ information as shopping is increasingly conducted online. According to a 2011 …

Battles over online information control to escalate

The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, escalating battles over the control of online information and continuous …

Free ebook identifies easy to manage network security vulnerabilities

nCircle announced the release of a new eBook entitled “Just Turn it Off” (PDF, ePub). The book identifies twelve network security vulnerabilities that are both …

Businesses bracing for security impact on Cyber Monday

Most employees are not able to recognize online threats against the corporate network and companies are most concerned that online shopping could open the network to potential …

RSA enhances risk-based authentication solution

RSA announced enhancements to the RSA Adaptive Authentication On Premise solution designed to help organizations in wide range of industries achieve the right balance of …

Facebook says proposed European data protection fines could lead to court battles

Documents handed over following a Freedom-of-Information request to the Irish Data Protection Commissioner have revealed that Facebook does not appreciate the proposed …

Thwart attackers’ search for info by ditching out-of-office notifications

When it comes to successfully defending organizations from targeted attacks, IT administrators must be aware that attention to every detail – no matter how small – …

Norton Mobile Security adds protection for iOS

Norton by Symantec released the latest version of Norton Mobile Security which delivers protection for consumers’ mobile needs, including support for iOS devices. New …

Video: Why privacy matters

Privacy International asked lawyers, activists, researchers and hackers at Defcon 2012 about some of the debates that thrive at the intersection between law, technology and …

Fake versions of popular Apple apps sold on Google Play

If you are an Android user but you want to try out some of Apple’s most sought-after apps, you might be surprised to know that Apple has been seemingly offering them for …

PCI Council adds guidelines for data security risk assessment

The PCI Security Standards Council (PCI SSC) released the PCI DSS Risk Assessment Guidelines Information Supplement, a product of the PCI Risk Assessment Special Interest …

Don't miss

Cybersecurity news