Failed backups endanger revenue and productivity
SMBs are losing critical business information as a result of failed backups, and have suffered significant impacts as a result, according to GFI Software. Many IT …
Oracle releases critical security updates for Java
Oracle released 40 new Java security fixes. 37 of the vulnerabilities may be remotely exploitable without authentication. This was described as the possibility of being …
How to detect hidden administrator apps on Android
Following the discovery of a new Android Trojan that uses several errors and vulnerabilities in the Android OS to make analysis harder for researchers and to remain hidden …
CyanogenMod founder aims to thwart data-grabbing apps
There’s some very good news for users of CyanogenMod, one of the most popular modified Android firmware on the market: its founder and main developer Steve Kondik (aka …
Bill aims to regulate email privacy in the cloud
Texas Governor Rick Perry has signed and thusly put into effect HB 2268, a bill that legislates that law enforcement agents must get a search warrant to access …
Businesses not fully implementing infosec programs
Many U.S. small businesses are taking a passive approach when it comes to protecting their data leaving themselves vulnerable to data loss and possible financial and …
The security of WordPress plugins
Checkmarx’s research lab identified that more than 20% of the 50 most popular WordPress plugins are vulnerable to common Web attacks, such as SQL Injection. Furthermore, …
Free anti-spam software for the Mac
Cloudmark announced the latest version of Cloudmark DesktopOne for Mac, an anti-spam solution that users can use to filter email to eliminate messaging threats, protecting …
Microsoft releases Enhanced Mitigation Experience Toolkit 4.0
Microsoft has announced the release of version 4.0 of its popular Enhanced Mitigation Experience Toolkit (EMET), a free utility that helps prevent memory corruption …
Is accessing work apps on the move destructive?
There’s a lack of mobile working policies can lead to destructive consequences for businesses, according to Ping Identity. On a regular basis, 44% of employees access up …
New regulation for ENISA, the EU cybersecurity agency
EU cybersecurity agency ENISA has received a new Regulation, granting it a seven year mandate with an expanded set of duties. ENISA’s Executive Director, Professor Udo …
Key obstacles to effective IT security strategies
Drawing on data gathered from a total of 3,037 individuals – 1,944 technicians and 1,093 executives – in the United States, Canada, United Kingdom, Australia, …
Featured news
Resources
Don't miss
- Vulnerable firmware for Gigabyte motherboards could allow bootkit installation
- AsyncRAT evolves as ESET tracks its most popular malware forks
- Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech
- Securing vehicles as they become platforms for code and data
- How service providers can turn cybersecurity into a scalable MRR engine