Guy steals $80,000 worth of Nike items via website loophole
A former college baseball player from Virginia managed to get his hands on Nike merchandise worth over $80,000 for free after having found and exploited a loophole in one of …
BYOD governance, security and privacy issues
Even IT professionals tasked with securing corporate data would be concerned about the privacy of their personal information if mobile device management (MDM) software were …
Compromised online accounts for sale
The recently unearthed website of a service specializing in selling access to compromised email and social networking accounts of Russian and Ukrainian users offers a …
Trend Micro Mobile Security 8.0 released
Trend Micro launched Trend Micro Mobile Security (TMMS) 8.0 which enhances the enforcement of existing password and encryption policies as well as provides more granular …
Spear phishing targets one in two organizations
Proofpoint announced findings from a survey of security IT enterprise decision makers, about email and information security trends. Key findings include: Spear phishing is an …
Encryption for Microsoft Office 365
CipherCloud unveiled CipherCloud for Office 365, a cloud encryption gateway that transparently encrypts all email message, calendar, and contact data stored in …
When employees leave so does your data
One in three (32%) employees have taken or forwarded confidential information out of the office on more than one occasion, according to Iron Mountain. When people change jobs, …
D-Link releases Cloud Camera 5000 with pan and tilt
D-Link announced its D-Link Cloud Camera 5000 (DCS-5222L), which offers a round-the-clock surveillance solution with 720p HD recording, smooth pan/tilt and digital zoom …
Metasploit Pro increases vulnerability management efficiency
Rapid7 introduced the means to increase vulnerability management efficiency by leveraging intelligence from its penetration testing solution, Metasploit Pro, to validate …
Real-time fraud prevention with PhoneID Contact
TeleSign announced the newest product in the PhoneID suite, which helps online businesses block fraud by delivering name and address details based on a phone number. PhoneID …
Spam for Dropbox users raises speculations about breach
European Dropbox users have been inundated with spam advertising gambling websites, prompting speculations about a possible breach of the company’s systems. The news …
Energy grids are prime attack targets
The electrical power grid is the backbone on which everything else depends. A cybercriminal could debilitate a major city by a single targeted attack on the energy grid and …
Featured news
Resources
Don't miss
- Why we must go beyond tooling and CVEs to illuminate security blind spots
- Making security and development co-owners of DevSecOps
- Review: Passwork 7.0, self-hosted password manager for business
- What a mature OT security program looks like in practice
- Machine unlearning gets a practical privacy upgrade