Please turn on your JavaScript for this page to function normally.
US Senate shoots down Cybersecurity Act of 2012

Despite being endorsed by President Obama, the Cybersecurity Act of 2012 has been blocked by the US Senate. The bill was aimed at enhancing the security and resiliency of the …

Infosec student pleads guilty to online coupon scam

A former computer security student who was arrested in May 2011 for posting counterfeited coupons online, has plead guilty to charges of wire fraud and trafficking in …

Skype spamming tool offered for peanuts

It’s any wonder that a lot of individuals who want to earn a quick buck turn to setting up online scams when the tools to do it are widely available and cheap, and the …

Illinois bans employers from demanding employees’ Facebook password

Illinois-based job searchers can breathe a collective sight of relief, as the state’s Governor Pat Quinn signed on Wednesday a bill that will prevent employers to demand …

“See who viewed your Facebook profile” scam targets users via Twitter

Even Twitter users aren’t safe from “See who viewed your Facebook profile” scams. “Twitter Followers? Check this out New Facebook Followers has been …

Barracuda web filter adds social media controls

Barracuda Networks released Barracuda Web Filter Firmware 6.0, which adds support for more than 400 profiled applications beyond the scope of traditional URL or domain …

Open source NAC system PacketFence 3.5 released

PacketFence is a fully supported, trusted, free and open source network access control (NAC) system. Among the features provided by PacketFence, there are: BYOD (Bring Your …

Total Defense launches mobile security for business

Total Defense launched the Total Defense Mobile Security Suite, a cloud based solution that delivers a wide range of security and management features to reduce the risks …

Large-scale open source public cloud powered by OpenStack

Rackspace announced the availability of cloud databases and cloud servers powered by OpenStack, along with a new control panel. The introduction of these open cloud products …

Security Automation Essentials

Security Automation Essentials lays out comprehensive technical, administrative, and operational strategies for security management. Discover how to define baseline …

DDoS attacks aimed at telecom systems are on the rise

DDoS attacks are usually seen as the domain of hacktivists and hackers looking to block – then blackmail – companies that are heavily dependent on their Internet …

Application recovery challenges and how to address them

In response to such trends as growth of mission-critical data, the proliferation of virtualization and cloud within the data center, and the erosion of organizational …

Don't miss

Cybersecurity news