Tips for network administrators as mobile device usage increases
The increase in mobile device has resulted in network challenges for businesses of all types and sizes. According to the Monetate Q1 2013 Ecommerce Quarterly, tablets have …
Viewfinity launches a new application control solution
Viewfinity announced the availability of the Viewfinity Application Control solution, a homogeneous software solution that includes application whitelisting, managing trusted …
McAfee ePolicy Orchestrator exploitation tool
US-CERT’s latest advisory focuses on an exploit tool for McAfee ePolicy Orchestrator. The tool targets two vulnerabilities found in ePO versions 4.6.5 and earlier. In …
INTERPOL and Trend Micro to collaborate against cybercrime
Trend Micro is to collaborate with INTERPOL, the world police body, to support global law enforcement programmes to combat cybercrime. The announcement is the latest in …
Microsoft helped NSA get around its encryption
It has been a bad month for US Internet giants, but things got even worse for Microsoft as the latest batch of NSA documents leaked by Edward Snowden revealed that the company …
Unusual Facebook spam campaign delivers malicious Macros
A bizarre spam / malware delivery campaign is currently targeting Facebook users. It starts with the offer to see a video of a girl performing a salacious act – and this …
Infographic: Is your information safe?
ID Experts released an infographic that provides a snapshot of identity theft and data breach over the last decade. Click on the image below to see the large version. Data …
Free malware removal tool gets new features
The fourth generation of Emsisoft Emergency Kit is now available. It now boasts an improved cleaning function for the removal of malicious software. And at the same time it …
EMC releases array of new products
EMC announced new hardware and software products that enable customers to deploy new Protection Storage Architectures that address today’s and tomorrow’s data …
Bug bounties are cheaper than hiring full-time bug hunters
Software companies that have instituted bug bounties are on the right track, a recently published report by researchers of the University of California, Berkeley computer …
Blue Coat Internet monitoring devices (mis)used in Iran, Syria, Sudan
Even though US sanctions should have made it impossible, filtering and Internet monitoring devices by US-based Blue Coat Systems can be found on many computer networks in …
Bluebox releases free scanner for Android “master key” bug
Bluebox Security, the mobile security startup that’s “working to save the world from information thievery”, has made a name for itself by finding and …
Featured news
Resources
Don't miss
- What 35 years of privacy law say about the state of data protection
- 40 open-source tools redefining how security teams secure the stack
- Password habits are changing, and the data shows how far we’ve come
- Product showcase: Tuta – secure, encrypted, private email
- Henkel CISO on the messy truth of monitoring factories built across decades