Microsoft Assessment and Planning Toolkit 8.0 Beta released
The Microsoft Assessment and Planning (MAP) Toolkit’s new capabilities help you assess the readiness of your environment for deploying Windows 8 and Windows Server 2012. …
Symantec envisions safe cloud strategy
Symantec announced its vision for safe, agile and efficient clouds. In five years, companies will operate in a converged IT world of cloud, virtualization and mobile computing …
EFF teaches how to file FOIA requests
The Electronic Frontier Foundation (EFF) has announced a new project that should make it easier for interested parties to search for information the organization received …
New Facebook users will be educated on privacy
Facebook has announced that when signing up for the social network, new users will be subjected to a more prominent and detailed education about privacy and information …
Image-stealing malware might lead to blackmailing attempts
Information-stealing malware targeting random computer users is usually geared towards stealing passwords and financial information by logging pressed keys and taking …
Protect web browsing sessions on iOS devices
Quarri Technologies released Quarri Protect On Q (POQ) Mobile for iOS, a web information security solution that enables organizations to protect and control end-user web …
PayPal, Symantec, ImageShack, NBC targeted in hacking spree
The last few days have witnessed a flurry of activity and data leaks from several hacker groups. Anonymous has leaked VMware’s ESX Server kernel source code online, and …
Gartner says EMEA IT spending will grow
IT spending in Europe, the Middle East and Africa (EMEA) will reach $1.154 trillion in 2013, a 1.4 percent increase from 2012 projected spending of $1.138 trillion, according …
PHD Virtual unveils enterprise backup solutions
PHD Virtual Technologies announced their solutions are well-suited for large enterprise environments as well as small businesses with growing data storage, backup and recovery …
Life cycle and detection of an exploit kit
As the process of owning systems and dragging them into botnets becomes ever more commercialized, exploit kits have emerged as a favorite of attackers. Their point-click-own …
Information Overload
Written and edited by an international group of experts from academia and industry, Information Overload clearly links academic theory to real-world practice, providing a …
Week in review: Facebook investigates data leak, removes insecure feature, and Windows 8 exploit on sale
Here’s an overview of some of last week’s most interesting news, podcasts and articles: Privacy compliance laws: Why the European Commission finally got it right …
Featured news
Resources
Don't miss
- January 2026 Patch Tuesday forecast: And so it continues
- How AI agents are turning security inside-out
- Security teams are paying more attention to the energy cost of detection
- Recently fixed HPE OneView flaw is being exploited (CVE-2025-37164)
- PoC released for unauthenticated RCE in Trend Micro Apex Central (CVE-2025-69258)