Most effective ways to stop insider threat
Imperva examined the psychological, legal and technological tactics employed by leading organizations to mitigate insider threats, a class of enterprise risk perpetuated by a …
Qualys extends QualysGuard Cloud Platform
Qualys announced that QualysGuard Vulnerability Management will now feature vulnerability prediction capabilities within a new dashboard and threat reports for zero-days and …
Entrust IdentityGuard delivers mobile smart credentials
To enable organizations to secure and leverage mobile devices in the wake of BYOD trends, Entrust extends its identity-based security platform with Entrust IdentityGuard …
Weak crypto allowed spoofing emails from Google, PayPal domains
Zach Harris, a Florida-based mathematician, discovered that Google and many other big Internet companies use weak cryptographic keys for certifying the emails sent from their …
CyanogenMod found logging Android unlock swipe gestures
CyanogenMod, one of the most popular modified Android firmware on the market, has been found containing code that logs the swipe gestures used by the users to unlock their …
Bogus Twitter DMs lead to iPad scam, surveys and phishing
Yesterday’s unveiling of the iPad Mini has not lead to a decrease in desirability of its bigger version, and the offer of a free device is still a very effective lure …
Industry-by-industry cybercrime snapshots
Verizon released a series of industry-by-industry snapshots of cybercrime aimed at helping organizations better understand the anatomy of a data breach and how to best provide …
U.S. DHS reshuffles its cyber office, adds two more divisions
Trying to keep in step with the increasing need for cybersecurity capabilities, the U.S. Department of Homeland Security’s Office of Cybersecurity and Communications …
Card readers in Barnes & Noble stores hacked by crooks
On September 14, Barnes & Noble, the largest book retailer in the United States, has turned off the keypads in front of registers in all of their physical stores without …
Top 10 strategic technology trends for 2013
Gartner highlighted the top 10 technologies and trends that will be strategic for most organizations in 2013. Gartner defines a strategic technology as one with the potential …
Protecting print devices from malware
Xerox and McAfee revealed new protection against malware and viruses with the first networked multifunction printer to use McAfee Embedded Control software, a filtering method …
TeamMentor: Secure software development knowledge base
Security Innovation released TeamMentor 3.2, a SaaS product that provides guidance to help security and development teams create secure software out of the box, along with …
Featured news
Resources
Don't miss
- Vulnerable firmware for Gigabyte motherboards could allow bootkit installation
- AsyncRAT evolves as ESET tracks its most popular malware forks
- Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech
- Securing vehicles as they become platforms for code and data
- How service providers can turn cybersecurity into a scalable MRR engine