Please turn on your JavaScript for this page to function normally.
BYOD is overtaking the workplace, security is top concern

Across the U.S. and Europe, the majority (78 percent) of enterprise IT decision makers say that employees are already using consumer devices to conduct company business, …

Facebook Developer World HACK 2012 announced

Facebook announced the Facebook Developer World HACK 2012, a series of events hosted around the world throughout August and September. Facebook Developer HACKs are day-long …

RSA and Bit9 team to accelerate cyber forensics investigations

Bit9 announced an agreement with RSA to integrate Bit9’s cloud-based software reputation service with RSA NetWitness Spectrum Live service. Under terms of the agreement, …

Next Level Security Systems releases new security management platform

Next Level Security Systems announced the expansion of its NLSS Gateway product suite with the introduction of the NLSS Gateway 5000, an enterprise-class unified appliance …

Microsoft confirms IE10 will have “Do Not Track” on by default

When Microsoft released the preview of Internet Explorer 10 at the beginning of June and announced that in Windows 8 the browser will be sending a “Do Not Track” …

eBay’s security efforts lead to massive fraud drop and 3K arrests

eBay, the notable online auction and shopping mammoth website and the company that runs it, has taken the fraud threat seriously and has managed to cut it by 90 percent in the …

Web apps experience 2,700+ attacks per year

The median annual attack incidents on the 50 Web applications observed was 274 times a year, with one target experiencing more than 2,700 attack incidents. According to a new …

Join the Smart Grid Security Virtual Summit

On Thursday, August 9, Smart Grid Observer will host a full-day Smart Grid Security Virtual Summit. The event brings together a range of top utility practitioners and security …

The fuel that drives global cybercrime

Karine de Ponteves is a FortiGuard AV analyst with Fortinet. In this interview she discusses how cybercriminals exploit major events to deliver malware, the oversharing of …

Spam filtering tools fail short with phishing attacks

Enterprise users receive unfiltered phishing messages nearly every day of the week, and most of them are not properly trained to recognize or safely react to them, according …

Android malware masquerading as legitimate AV apps

If you’re an Android user, you probably couldn’t help but notice the hundreds of articles about the proliferation of malware created specifically for that …

Apple, Amazon change their security policies following epic hack

In the aftermath of the spectacular hack that left former Gizmodo employee Mat Honan without access to his Twitter account, his Gmail, his iCloud account and with his iPhone, …

Don't miss

Cybersecurity news