Please turn on your JavaScript for this page to function normally.
Comprehensive email threat protection from GFI Software

In order to help SMBs in the fight against email-borne threats, GFI Software today announced the availability of GFI MailEssentials 2012 UnifiedProtection. The solution …

NetIQ minimizes the risk of unauthorized access

Organizations struggle with managing and reporting on end user access and entitlements to meet monthly or quarterly reporting audit cycles and protect corporate information. …

The difficulties in sizing up botnets

The main metric with which security researchers identify how effective and disruptive specific botnets are is the number of computers they consists of. Estimating their size …

RedKit exploit kit spotted in the wild

A new exploit kit that Trustwave researchers have spotted being used in the wild is aiming to enter a market that is practically monopolized by the widely famous BlackHole and …

“Free additional storage” phishing emails doing rounds

Symantec researchers warn about a variety of fake emails supposedly coming from popular email and online storage services, offering “storage quota upgrades”. A …

Android drive-by download malware served by hacked websites

A number of legitimate but compromised websites have been spotted serving Android malware to unsuspecting visitors, warns Lookout. The downloading of the malware, which poses …

Location-based apps thrive despite privacy concerns

Fifty-eight percent of consumers who have a smart device use location-based applications, despite concerns about safety and third-party use of their personal information for …

Autorun-based threats account for 12% of global infections

Bitdefender announced that more than four years after Autorun was eliminated from operating systems, worms that take advantage of the antiquated feature account for more than …

ISO 27001 benefits: How to obtain management support

As with any other project, if you do not ensure enough money and human resources, your ISO 27001 project will fail. Therefore, the only way to get those is to get your …

50% of businesses feel the cloud is too risky

Despite the apparent enthusiasm around cloud computing, a Wisegate survey revealed that over 50% believe the cloud is too risky for prime time, and only suitable for commodity …

Child ID theft epidemic continues to spread

The epidemic of child identity theft revealed last year is continuing to grow. 10.7% of the nearly 27,000 children in the study are victims of identity theft, 35 times higher …

Users feel insecure on social media sites

More than four out of five users worry about their personal information being stolen or misused on social media sites such as Facebook, Google+ and Twitter, according to …

Don't miss

Cybersecurity news