Please turn on your JavaScript for this page to function normally.
Win8’s AV will kick in after other solutions stop working

Last week, McAfee shared the findings of a year-long project that revealed that some 17 percent of all the tested PCs around the globe had either no AV software installed or …

Apple publishes iOS security guide

Apple has a reputation for being extremely reticent when it comes to discussing security in public – so much so that most of the security features their devices sport …

UGNazi attack 4chan, CloudFlare

Visitors to 4chan have recently been automatically redirected to the Twitter account of hacker group UGNazi, and an investigation into the matter revealed that the attack has …

Real-time mobile vulnerability management

Mobilisafe launched its cloud-based Mobile Risk Management (MRM) solution, enabling IT to identify and eliminate the significant risks associated with the …

Over-55s pick stronger passwords than youngsters

Despite the often repeated recommendations by security experts, most users regularly fail to choose strong enough passwords. Joseph Bonneau, a computer scientist and …

Consumers confused about data breaches

A business’s ability to protect personal information and communicate the circumstances of a data breach can impact customer loyalty and an organization’s …

Some Flame modules were signed with rogue Microsoft certificates

While investigating the recently unearthed Flame (SkyWiper) toolkit, Microsoft’s researchers have made an unwelcome discovery. “We have discovered through our …

Siemens enhances security of industrial networks

Siemens announced new versions of its Simatic NET CP 343-1 Advanced and Simatic NET CP 443-1 components with integrated security functions to enable companies to enhance the …

iOS app creates different personas on social networks

Have you ever decided not to post an update because you didn’t want your entire social network to be privy to every intimate detail of your life? Of course you have. …

Information Storage and Management

Information Storage and Management covers the components of a storage system and the different storage system models while also offering essential new material that explores …

Week in review: New cyber weapon Flame, gamers under attack, and the new issue of (IN)SECURE Magazine

Here’s an overview of some of last week’s most interesting news, podcasts, videos, interviews and articles: Privacy trends affecting security In this podcast …

Ex MI5 chief gets her laptop stolen at airport

The former Director-General of UK’s internal security service MI5 has had her laptop stolen at London’s Heathrow airport on Tuesday. Dame Stella Rimington, who …

Don't miss

Cybersecurity news