Please turn on your JavaScript for this page to function normally.
Top five tips for network protection

This year has seen a continued rise in targeted attacks and insider threats designed to steal confidential data. Nowadays, any organization that houses valuable intellectual …

Free dual-engine malware scanner

The free Emsisoft Emergency Kit 3.0 can detect and remove malware by simply starting it directly from a USB stick or CD without the need for installation. The kit comes with a …

Big data creates big jobs: 4.4 million IT jobs by 2015

Worldwide IT spending is forecast to surpass $3.7 trillion in 2013, a 3.8 percent increase from 2012 projected spending of $3.6 trillion, but it’s the outlook for big …

Self-configuring UTM security appliance from WatchGuard

WatchGuard Technologies announced that it is the first UTM security appliance vendor to offer a firewall that configures itself. The company is adding a new cloud-based …

Verdasys launches Digital Guardian 6.1

Verdasys announced Digital Guardian 6.1, an information protection platform that integrates compliance, insider threat prevention and cyber threat prevention. The release also …

Popular Android apps leaking passwords due to poor SSL

A group of researchers from two German universities claim that eight percent of the 13,500 popular, free-of-charge, legitimate Android Android apps they downloaded from Google …

First application firewall for Google Apps

CloudLock launched CloudLock Apps Firewall, which helps enterprises discover, classify and enable trusted third party mobile and web apps that require access to users’ …

Analysis of 15 million cyber attacks

A new web application attack report by FireHost offers an impression of the current internet security climate and provides statistical analysis of 15 million cyber attacks …

Increase in drive-by attacks and infected emails

In August and September 2012, the research team from Eleven, a German email security provider, recorded a significant increase in malware sent via email. The most significant …

Microsoft concludes Russian programmer didn’t operate Kelihos botnet

Following the settling of the Nitol botnet lawsuit earlier this month, Microsoft has announced on Friday that it has reached a settlement with Russian software programmer …

Britain is targeted by cyber attacks every hour

This week, Foreign Secretary William Hague revealed that “not an hour goes by when a system in the UK is not being attacked”, and not only do the hackers attempt …

Shortened .gov URLs lead to scams

The fact that cyber crooks often misuse URL shortening services in order to trick users into following dangerous links is not news, but Symantec researchers have lately …

Don't miss

Cybersecurity news