Please turn on your JavaScript for this page to function normally.
Managing firewalls in virtual environments

AlgoSec announced the ia solution for managing firewalls in virtual environments. AlgoSec Security Management Suite simplifies hypervisor-level firewall management by …

The risks of unauthorized access

HP unveiled new global research that reports increased threats to sensitive and confidential workplace data are created by a lack of control and oversight of privileged users, …

Chrome is the most secure browser, claims new study

Microsoft’s Internet Explorer does a better job protecting systems from attackers who already have gained some degree of access than Mozilla’s Firefox, and …

2,000 live typosquatted domains discovered

Customers of major high-street brands such as Argos, Debenhams, and John Lewis are falling victim to cybercriminals that target mistyped web addresses, a technique known as …

Spam campaign bypasses Gmail filters, employs Google Docs

Every now and then, online crooks and spammers use Google Docs to host phishing forms or documents with embedded malicious links. One such spam campaign is currently …

Premium SMS fraudulent apps target European users

European mobile phone users should be on the lookout for premium SMS toll fraud apps as a great number of them has been lately discovered on file sharing sites, third-party …

Pros losing confidence in hard tokens

Almost a quarter of organizations, 23%, have suffered a security breach as a result of identity fraud which was linked to a lost or stolen authentication device, according to …

Personal info of US law enforcement agents published following hack

The official website (Clearusa.org) of the Coalition of Law Enforcement and Retail has been attacked by a hacker that goes by the handle of “Exphin1ty” who claims …

SMS Privato Spy: Another piece of bogus software for sale

Every so often, a new piece of non-existent software gets advertised by scammers that are eager to part users with their hard earned cash. The latest one to be spotted is …

The value of securing Internet enabled devices

From the hottest new tablet to sleek smartphones and laptops, electronic devices are likely to be at the top of many consumers’ Christmas wish lists this year. …

IT departments have easiest access to sensitive data

CEOs of modern companies often lack access to their own sensitive data, according to Venafi. When asked who had the easiest access to their company’s most sensitive …

2012 network security trends

Looking back on 2011, FortiGuard Labs saw a number of landmark developments in the world of network security. Huge botnets such as DNS Changer and Coreflood were permanently …

Don't miss

Cybersecurity news