Gizmodo hack reveals worrying flaws in data management policies
Mat Honan, the former Gizmodo employee who’s personal Twitter account compromise resulted in the temporary hijacking of the tech blog’s Twitter account, has …
Threats and protection issues of cloud data
Eighty-two percent of organizations already transfer, or plan to transfer, sensitive or confidential data into the cloud environment according to a global study of 4,000 …
Quantum cryptography theory has a proven security defect
Researchers at Tamagawa University, Quantum ICT Research Institute, announced today that they had proved the incompleteness and limit of the security theory in quantum key …
Employees targeted with faked emails from payroll services firms
Administrators at companies that outsourced payroll management to outside firms have recently been heavily targeted with malicious emails supposedly coming from those very …
GFI MailArchiver 2012 tackles email storage and data leakage
GFI Software announced the availability of GFI MailArchiver 2012 that offers new reporting capabilities to guard against data leakage of sensitive information, such as social …
Malicious Olympic 2012 Android apps spotted
The Olympic Games currently underway in London have proven to be one of the best lures for cyber scammers and other cyber crooks: we’ve had Olympic-themed spam emails …
New version of Palamida’s scanning solution for open source projects
Palamida recently announced Enterprise Edition 6, the latest edition of its open source intellectual property and vulnerability risk management product. The new version adds a …
The underground economy of social networks
In a new study, Barracuda Labs analyzed a random sampling of more than 70,000 fake Twitter accounts that are being used to sell fake Twitter followers. They also analyzed some …
WatchGuard XTM 5 Series network security appliances released
WatchGuard released WatchGuard XTM 5 Series network security appliances. Appliance packet filtering increased nearly 40 percent, gateway antivirus is 190 percent faster, IPS …
USB with AES 256-bit hardware encryption
Enova Technology announced the Enigma module, a USB encryption solution designed to provide real-time full disk encryption for any USB mass storage class (MSC) drive. Key …
Critical Watch releases countermeasure recommendation engine
Critical Watch launched its ACI Recommendation Engine which consolidates multiple disparate data points into a unified view of risks. It’s designed to help close the gap …
“Microsoft support” scammers still cold calling users
The old “Microsoft support center” scam is back. It is likely that it never went away, but lately the scammers have increased their efforts, targeting users again …
Featured news
Sponsored
Don't miss
- Scammers dupe chemical company into wiring $60 million
- Australian gold mining company hit with ransomware
- Browser backdoors: Securing the new frontline of shadow IT
- Key metrics for monitoring and improving ZTNA implementations
- Chrome, Edge users beset by malicious extensions that can’t be easily removed