Big Data: Huge risk or huge opportunity?
The amount of data government agencies must capture, store, and analyze is growing exponentially. Whether this data boom provides agencies with new opportunities to gain …
Disruptive tech trends that will change everything
At the opening keynote for the 43rd annual ISACA North America Computer Audit, Control and Security (CACS) Conference, New York Times personal-technology columnist David Pogue …
Study of the European data center market
Digital Realty Trust has released key findings from its annual study of the European data center market. The survey of senior leadership at large corporations in Europe …
Radware unveils SDN strategy
Radware introduced DefenseFlow, the first in the company’s suite of Software Defined Networking (SDN) applications providing organizations with network wide attack …
WordPress sites targeted by mass brute-force attack
US-CERT has issued an alert regarding the ongoing massive brute-force attacks against WordPress sites, warning users and administrators to keep their installation always …
The Social-Engineer Toolkit 5.0 released
TrustedSec released the Social-Engineer Toolkit (SET) 5.0 codename: The Wild West. This version is a culmination of six months of development, bug squashing, and user …
Set your Google account to be deleted after you die
Google has rolled out an interesting feature: the Inactive Account Manager. Aimed at providing some peace of mind for privacy minded users that worry what will happen with …
Mobile malware up 163%
Mobile malware threats increased 163% to more than 65,000 in 2012, according to NQ Mobile. The problem is becoming more complex as smarter mobile malware can better target …
FAA and EASA say hijacking planes using an app is not possible
The big news last week was that, according to researcher Hugo Teso, it is possible for malicious individuals to take control of an airplane using a special framework and an …
Cloud-based security services still in high demand
By 2015, 10 percent of overall IT security enterprise product capabilities will be delivered in the cloud, according to Gartner. The services are also driving changes in the …
Real-world test of 21 antivirus products
AV-Comparatives have released results of their latest Real-World Protection Test. These show that in a real-world digital environment with ever-increasing malicious programs, …
Employees admit to accessing or stealing private company information
In a survey of 1,000 employers by LogRhythm, 80 percent do not believe any of their workers would view or steal confidential information, while three quarters (75 percent) …
Featured news
Resources
Don't miss
- January 2026 Patch Tuesday forecast: And so it continues
- How AI agents are turning security inside-out
- Security teams are paying more attention to the energy cost of detection
- Recently fixed HPE OneView flaw is being exploited (CVE-2025-37164)
- PoC released for unauthenticated RCE in Trend Micro Apex Central (CVE-2025-69258)