Please turn on your JavaScript for this page to function normally.
HP identifies the sophistication of security attacks

HP published the 2011 Top Cyber Security Risks Report, which identifies the growing sophistication and severity of security attacks and the resulting risks. The report …

How cybercriminals are infecting networks

Research by Websense reveals the trifecta that is driving epidemic levels of data theft: 1) extremely effective social media lures 2) evasive and hard-to-detect infiltration …

The importance of ethical hacking

The need for more effective information security practices is increasingly evident with each security breach reported in the media. When adopting new technologies like cloud …

Most IT admins considered switching careers due to stress

67% of IT administrators have considered switching careers due to job stress, according to GFI Software. Managers, users (employees), and tight deadlines were cited as the …

Control and encrypt email with CipherPost Pro

AppRiver unveiled a secure email delivery solution, CipherPost Pro, a service that allows businesses to control and encrypt email and email attachments. CipherPost Pro …

Universal IPsec VPN client for Android 4.0

NCP engineering released a preview version of its IPsec VPN client to support the remote access needs of Android 4.0 (Ice Cream Sandwich) platform users. The NCP Secure …

Spam campaign combines phishing, malware and survey scams

An ongoing spam campaign characterized by brief subject lines and containing only a hyperlink rendered in a large font saying “Click here to see the attached …

Anonymous to set up secure Pastebin alternative

Following Pastebin.com owner’s announcement of his intention of speeding up takedown of sensitive information and his willingness to share the posters’ IP …

Google sent out notifications to owners of hacked sites

Matt Cutts, the head of Google’s Web spam team, has announced on his Twitter account that the company has notified 20,000 Web site owners that their sites may have been …

Fake jobs site owner filed tax returns with stolen identities

A 31-year-old that has set up a website offering the possibility for unemployed people to apply for non-existing jobs and has been using the collected applicants’ …

Businesses unable to comply with EC 24 hour breach notification

UK businesses do not believe they have the capability to comply with new European Commission Data Protection Directive rules, specifically the ability to generate accurate …

ISO 27001/BS 25999-2: The certification process

Obtaining an ISO 27001 or BS 25999-2 certificate is not mandatory, however most of the companies implementing either of these standards want to get certified – the main …

Don't miss

Cybersecurity news