Amazon.com released Fire OS 3.0 “Mojito”
Amazon.com introduced Fire OS 3.0 “Mojito,” the next generation of software and services that powers Kindle Fire tablets, with hundreds of updates and new features …
Deploy endpoint encryption technologies with Wave Cloud 2014
Wave Systems launched Wave Cloud 2014, a cloud-based service for enterprise-wide management of endpoint encryption. It includes management of Windows BitLocker and Mac …
CORE Impact Pro 2013 R2 gets enhanced web services capabilities
CORE Security released CORE Impact Pro 2013 R2, that allows organizations to proactively test IT infrastructure and identify exactly where and how an organization’s …
Data broker databases breached, stolen info used by ID theft service
Stolen users information is regularly sold and bought online by cyber crooks and attackers, and many services have sprung up to meet the demand for information that can be …
Yahoo ID recycling scheme is potential security minefield
Yahoo’s recently announced email account / Yahoo ID recycling scheme was meant to free up inactive (and attractive) accounts so that they can be snapped up by another …
Employees keep using personal cloud services to store work documents
Nearly 30% of employees are using personal cloud services to store work-related documents, according to a survey conducted at recent technology trade shows in which 5% of …
Java exploits jump, Android malware emerges outside app stores
A continued rise in exploit-based attacks, particularly against Java, and an increasing sophistication in mobile threats characterized the first half of 2013, which saw its …
Free Wi-Fi, but at what cost?
An investigation into public Wi-Fi has found that 51% of free Wi-Fi hotspots in the UK allow access to content of an adult nature. AdaptiveMobile examined Wi-Fi filtering …
Budget and job trend data for CISOs
Wisegate released its IT Security Benchmark Report, based on a survey developed by Wisegate Members, who are senior CISOs and security practitioners, to answer the questions …
Phishing and malicious attachments on the increase
Spam volume has dropped in August, but with the level of phishing increasing tenfold and malicious attachments being found in 3.4 percent more emails when compared with July, …
MEPs raise suspension of EU-US bank data deal
MEPs raised the possibility of suspending or even terminating the EU-US Terrorist Finance Tracking Programme (TFTP), during the discussion on Tuesday about the NSA’s …
Attackers sharpen skills: What that really means for CISOs
Today, IBM is revealing the results of its X-Force 2013 Mid-Year Trend and Risk Report, which shows that Chief Information Security Officers (CISOs) must increase their …
Featured news
Resources
Don't miss
- Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
- Kali Linux 2025.4: New tools and “quality-of-life” improvements
- How researchers are teaching AI agents to ask for permission the right way
- Prometheus: Open-source metrics and monitoring systems and services
- What types of compliance should your password manager support?