Please turn on your JavaScript for this page to function normally.
Sophos wireless access point supports 5 GHz connections

Sophos announced the Astaro AP50, its new dual-band/dual-radio capable wireless access point. The new addition to Astaro’s wireless access point family supports both …

The Tangled Web: A Guide to Securing Modern Web Applications

Modern web applications are built on a tangle of technologies that have been developed over time and then haphazardly pieced together. Every piece of the web application …

Counterclank: Info-stealing Trojan or advertising tool?

A couple of days ago, Symantec has warned about Counterclank, an Android Trojan that has been unknowingly installed by users on over five million devices. This huge number was …

Law firms get hacked for deal data

A successful cooperation between a law firm and its clients depends on the firm’s ability of keeping the details of these relationships confidential – something …

Compromised WordPress sites lead to Phoenix exploit kit

Several hundred compromised websites that at first glance don’t appear to be malicious have been discovered by M86 researchers. The websites – mostly blogs and …

Greatest risks to database security

The greatest challenge to database security may actually come from organizational issues, rather than nefarious or accidental acts, according to a survey presented by …

The state of global cyber-readiness

McAfee and the Security and Defence Agenda (SDA) revealed the findings from a report that paints a global snapshot of current thinking about the cyber-threat and the measures …

Identity and access management trends

Six major trends will drive the evolution of corporate management of identity and access management (IAM) and privacy management in 2012, according to Gartner. “In 2012, …

Apache Shiro: Java security framework

Apache Shiro is a Java security framework that performs authentication, authorization, cryptography, and session management. With Shiro’s API, you can secure any …

The ABCs of security and compliance

Understanding Security and Compliance is as easy as ABC: Access, Breaches and Changes. At a distance security and compliance share many similarities. As you get into the …

High-performance wireless APs from Aruba Networks

Aruba Networks announced two additions to its portfolio of wireless access points. The Aruba Instant IAP-134 and IAP-135, both 900Mbps 802.11n access points, are designed for …

The Web Application Hacker’s Handbook, 2nd Edition

Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise …

Don't miss

Cybersecurity news