Please turn on your JavaScript for this page to function normally.
The future of cybersecurity in cars

As technology evolves at a seemingly breakneck speed, we must be aware of the fact that the environments in which we find ourselves every day – environments that have in …

Changing nature of DDoS attacks

The volume of packets-per-second (PPS) has almost quadrupled compared to Q3 2010, illustrating a significant increase in the size and diversity of DDoS attacks over the past …

DevilRobber Trojan returns, masquerades as PixelMator

DevilRobber, the latest Trojan to target Mac users, got updated. As you may remember, the previous incarnation stole Bitcoins from the user’s wallet file, used the …

Personal electronic signatures for everyone

DocuSign Ink helps consumers finish personal business faster by eliminating once and for all the hassles and costs of printing, faxing, scanning, and overnighting signed …

Change management leads to security breaches

75% of organizations believe their current change management processes could put them at risk of a security breach, according to Tufin. Having sampled 100 network security …

Why do companies backup infrequently?

Businesses are on average backing up to tape once a month, with one rather alarming statistic from the same survey showing 10 percent were only backing up to tape once per …

Teach children about online protection

In an effort to facilitate effective parent-child dialogue about Internet dangers, Trend Micro developed an eGuide with tips to help families have “The Talk” about …

nCircle PureCloud: Network security scanning service

nCircle announced PureCloud, a network security scanning service which combines security technology used by thousands of the world’s largest enterprises and government …

Mac OS X Lion: The Missing Manual

With Lion, Apple has unleashed the most innovative version of Mac OS X yet – and once again, David Pogue brings his humor and expertise to the #1 bestselling Mac book. …

Hearing on draconian new U.S. piracy legislation is under way

Today’s the day of the long awaited House Judiciary Committee’s hearing on the Stop Online Privacy Act (SOPA) and, as the Electronic Frontier Foundation claims, …

Facebook trims response to data requests

After the possibility to request data from Facebook under European data privacy laws became common knowledge, Europeans began inundating the social networks with requests. …

Top requirements for operating data in the cloud

The Cloud Security Alliance (CSA) Cloud Data Governance (CDG) working group today introduced the results of its Cloud Consumer Advocacy Questionnaire and Information Survey. …

Don't miss

Cybersecurity news