Safe Money technology protects online purchases
It’s no secret: most cybercriminals don’t want online fame, they want your money. Kaspersky Lab research shows that each day, more than 1,400 new pieces of banking …
Aramco hackers threaten to attack oil giant again
The group of hackers that claimed responsibility for the recent Saudi Aramco breach has announced that it will be targeting the company again because they want to prove that …
DDoS attacks protection advice from the EFF
Denial of service (DoS) and distributed denial of service (DDoS) attacks are increasingly common phenomena, used by a variety of actors—from activists to governments—to …
IDC finds increased adoption of storage efficiency technologies
The rapid increase in the amount of digital data that needs to be stored is pressuring organizations to increase capital expenditures associated with the acquisition of …
US Feds shutter three Android app pirate sites
For the first time since it has started the war against illegal sites, the US Department of Justice has swooped on three websites that were engaged in the illegal distribution …
Bogus Booking.com emails carry malware
The popularity of the Booking.com, one of the world’s biggest and most used online hotel reservations agency is getting misused in the latest malware distribution …
Google instituting internal Privacy Red Team
Google is looking for a Data Privacy Engineer to be part of an internal team whose goal will be to find – and remove – privacy risks in the company’s many …
McAfee Mobile Security gets additional privacy features
McAfee announced enhancements to its McAfee Mobile Security software, providing Android smartphone and tablet owners with additional privacy features that help them ensure …
Blackberry ID malware campaign
Websense ThreatSeeker Network intercepted a malware campaign targeting Blackberry customers. These fake emails state that the recipient has successfully created a Blackberry …
USB wireless access point from Sophos secures remote offices
Sophos announced the availability of the Sophos AP 5, its newest wireless access point which acts as an accessory to the Sophos Remote Ethernet Device (RED), creating a …
Changing risk assessment practices
Avoiding the use of software as a service (SaaS) for critical or sensitive data remains a significant form of risk control for many organizations, according to Gartner. But …
A true private cloud from CloudFounders
CloudFounders released CloudFrames, a software platform that converts commodity x86 hardware into a multi-function, ultra-reliable and high performance private cloud. …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground