Middle East plans to build a cyber-stronghold
The risks and consequences of cyber-attacks are increasing exponentially each day. The computers that control most of the world’s oil and gas production and distribution …
Wi-Fi hotspot testing simplified
Wi-Fi Hotspots are hot. From coffee shops, to airports, to sport venues, to gas stations and Laundromats, they’re springing up everywhere and are projected to grow 350 …
PayPal unveils new global mobile payments solution
PayPal announced PayPal Here, the first global mobile payments solution that allows small businesses to accept almost any form of payment. The service includes a free app and …
A decade of vulnerabilities and predictions for 2012
Since 2001, Spanish security firm S21sec has been been compiling a database of vulnerabilities detected by themselves and those reported by a great number of sources which …
TRICARE data theft was targeted?
When sensitive data of nearly 5 million TRICARE patients was compromised last September due to the theft of backup tapes from an employee’s car, the company quickly …
Android pattern lock stumps FBI forensic experts
Who would have thought that pattern screen locks on Android phones actually provide such an effective barrier to unauthorized access that even the FBI is forced ask Google for …
SSH user key management solution
SSH Communications Security unveiled today the first new extension of its SSH Information Integrity Platform, SSH User Key Management. The module will serve to provide …
Turn iOS devices into secure wireless flash drives
AirDisk Pro turns any iOS device into a personal and secure wireless drive, allowing users to save, manage, edit and view files on iPhone, iPad and iPod Touch devices. …
Profile Analyzer: Protect websites from cyber attacks
Silver Tail Systems announced Profile Analyzer, which provides real-time analysis of both individual user behavior and crowd behavior on websites to identify malicious …
Is Ukraine the perfect place for hackers?
What is it that makes the Ukraine such a fitting refuge for hackers and cyber crooks? According to a number of well-informed individuals, it is a combination of inadequate …
Key management device for payment security
Thales announced its Key Management Device (KMD) for payment hardware security modules (HSMs) to provide high assurance security for the critical task of forming cryptographic …
Malware sophistication worries IT leaders
More than half of IT leaders (62 percent) fear that malware is growing more sophisticated faster than they can upgrade their analysis capabilities. Additionally, 58 percent …
Featured news
Sponsored
Don't miss
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
- “0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days