New batch of Trusted Computing Group certified products
Trusted Computing Group has recently certified four products, including a Trusted Platform Module (TPM) and three products supporting the group’s security automation …
YubiKey NEO authentication token released
Yubico announced the production launch of the YubiKey NEO, a new authentication token that features Near Field Communications (NFC) technology, asymmetric cryptography support …
Secure View 3 recovers deleted data from Android phones
Susteen’s Secure View 3 digital forensics product is now able to recover deleted data from the large majority of Android phones. Law enforcement, military and government …
Infographic: “How companies track you on the Web”
Veracode’s new infographic illustrates how privacy transference has evolved into a major problem for consumers who willingly give information to businesses online, but …
Alarming number of merchants unaware of PCI DSS
The last four years have been marked by continued growth in small business data compromise, yet small business owners are still missing the point of the PCI DSS, a ControlScan …
Secure data-at-rest and data-in-motion on iOS and Android
Companies are moving their core business operations to mobile apps. App developers are at the center of this transformation and must deliver great apps quickly while ensuring …
Seagate Backup Plus gets USB 3.0
Seagate introduced SuperSpeed USB 3.0 to Backup Plus storage for Mac. This new interface means faster transfer of data, so you can backup more quickly, up to 10x that of USB …
“Free $100 McDonald’s gift card” scam targeting Facebook users
Facebook users are once again targeted with a rogue app / survey scam combo. The lure is a free McDonald’s $100 gift card: Users who want to get the prize are first …
Lock your Mac with QuickLock
QuickLock is a customizable way to lock your Mac. Unlike OSX’s hot corners, QuickLock works with a simple keyboard shortcut or menubar click, and never gets in the way …
ASUS unveils RT-N12HP wireless router
To serve home and office users who need wider wireless coverage, the ASUS RT-N12HP high-power wireless-N300 router employs detachable 9dBi antennas and a unique hardware …
Mac OS X and iOS Internals
Powering Macs, iPhones, iPads and more, OS X and iOS are becoming ubiquitous. When it comes to documentation, however, much of them are shrouded in mystery. Cocoa and Carbon, …
Most Android malware are SMS Trojans
Android versions 2.3.6, or ‘Gingerbread’, and 4.0.4, also known as ‘Ice Cream Sandwich’ were the most popular Android targets among cybercriminals in …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits