Please turn on your JavaScript for this page to function normally.
Carberp gang arrested in Russia

Eight men have been arrested in Moscow for having allegedly stolen over $2 million from the bank accounts of over 90 Russian individuals by infecting their computers with the …

Computer and biological viruses might eventually converge

The term “computer virus” was coined by Fred Cohen in the early 1980s, because like its biological counterparts, the computer virus is essentially a sequence of …

Beware of fake Google AV

Cyber crooks are once again trying to take advantage of Google’s name and logo to push malware onto unsuspecting users. According to GFI researchers, a number of pages …

Facebook privacy loophole allows regular spying on users

With over 845 million active users, Facebook is a great source of willingly shared information for anyone who can effectively become a “Facebook friend” with the …

Smartphone security checklist

While smartphones can make a significant and positive impact on those who embrace the technology, conversely the technology can wreak havoc on its users if they are …

Confidential documents are leaving the workplace

90% of Americans believe people remove confidential documents from the workplace, even though most adults (79%) say taking confidential files outside the office is grounds for …

Cisco goes beyond BYOD

Employees are demanding not only to use their own devices at work, but also to have more flexibility in the way they work and when and where they work. The Cisco Connected …

Phishers trick gamers with adult cam show offer

A rather clever phishing scheme targeting Italian gamers has recently been spotted by Symantec researchers. The scammy page, hosted on a free web hosting site, was made to …

Protect data and automate log management

Released today, WhatsUp Log Management 10.1.1 boasts pre-built, out-of-the-box reports, focused on complying with European-specific data protection regulations. The reports …

On-demand cloud identity management

Ping Identity unveiled PingOne, a multiplexed identity switch in the cloud. One connection to PingOne provides businesses the convenience of Tier 1 Single Sign-On (SSO) access …

BS 25999-2: An overview of BCM implementation process

While many business continuity methodologies exist for more than 20 years, none of them have really managed to include business continuity in regular management duties – …

The practice of insecure collaboration

Most often sensitive information exchanged beyond the firewall with business partners and customers is still primarily conducted through email and consumer-grade file sharing …

Don't miss

Cybersecurity news