Please turn on your JavaScript for this page to function normally.
Effectiveness of web application firewalls

The best defense against web application vulnerabilities and threats is to professionally train Web Application Firewalls (WAFs) and to incorporate Dynamic Application …

Hacker breached, changed grades in university academic record system

Santa Clara University, a private university run by the Jesuits and located in the Silicon Valley, has issued a statement confirming that it has called the FBI to investigate …

Windows 8 to do away with constant restarts after updating

I don’t know a single Windows user who isn’t annoyed at the number of times the operating system requires a restart, and especially annoyed when the request …

CSA offers a practical road map for secure cloud adoption

The Cloud Security Alliance (CSA) today unveiled the third version of its Security Guidance for Critical Areas of Focus in Cloud Computing. This effort provides a practical, …

Open source biometrics technology for mobile devices, PCs and servers

DigitalPersona has open sourced its new MINEX-certified FingerJetFX fingerprint feature extraction technology. FingerJetFX, Open Source Edition (OSE), is free, portable …

Cloud security best practices and tips

With the adoption of cloud computing continuing to accelerate, the need to adopt and maintain effective security and compliance practices is more important that ever. To help …

Email archive productivity headache

U.S. businesses are failing to maximize the efficiency with which they extract useful business intelligence from archived email, according to GFI Software. While a majority of …

Hiding messages in VoIP packets

A group of researchers from the Institute of Telecommunications of the Warsaw University of Technology have devised a relatively simple way of hiding information within VoIP …

RSA updates Data Loss Prevention Suite

RSA announced enhancements to its DLP Suite, a collection of risk-based data loss prevention products. The latest version offers enhancements that allow global organizations …

Expect an escalation in targeted attacks

Organizations and Internet users can expect an escalation in targeted attacks, growing social media threats and an increase in mobile malware, according to the M86 Security. …

Securely share files between PC, Mac, iOS and Android

Trend Micro released SafeSync, a tool for safe and simple synchronization. The new offering provides consumers an enhanced look and feel, simplified sync functionality and …

What hides behind the get-rich-working-from-home offers?

Do you ever get tempted to click on one of the myriad of work-from-home, get-paid-huge-money adverts that are littering the Internet? Do you ever wonder if those claims are …

Don't miss

Cybersecurity news