Please turn on your JavaScript for this page to function normally.
Web application security vulnerabilities and strategies

The use of web applications has soared recently, due to the significant value they can add to enterprises by providing innovative ways to interact with customers. However, so …

First public cloud to support Solaris

CloudSigma announced the addition of Solaris to its cloud platform, making it the first major public cloud to support Solaris. Solaris supports more than 11,000 third-party …

1000 professionals are now CSSLP certified

(ISC)2 announced that over 1,000 professionals from 44 countries now hold its Certified Secure Software Lifecycle Professionals (CSSLP) certification. Application …

Cloud computing disaster recovery

Online Tech announced a disaster recovery solution for cloud computing. DR Now! replicates the entire hosted cloud including servers, software, network and security to an …

“So i googled your name” Twitter phishing scam

Some Twitter phishers prefer to scare or worry their targets into clicking on the offered link, others put their money on pure, unadulterated curiosity. The latest phishing …

Japanese Parliament’s computers infected, data stolen

As the investigation into the breach of Mitsubishi Heavy Industries’ networks discovered last month continues, internal sources have confirmed that sensitive and …

Infected MyBB release package offered for download

The development team of MyBB (MyBulletinBoard), a popular PHP and MySQL-based free forum package, warned its users about the fact that its latest version available for …

Secure file sharing app for iOS

Accellion Mobile Apps for iPad and iPhone with iOS 5 support provide secure mobile file sharing capabilities are currently available from the App Store. The Accellion Mobile …

The m00p gang investigation: a failure or a success?

Security companies and law enforcement agencies often collaborate on cyber crime investigations, and most of these investigations do end up with the arrest, prosecution and …

Facebook Lottery scam emails making rounds

Offline crooks have had a lot of success with the bogus lottery winning letter scam, so it should come as no surprise it is often “translated” into an email and …

GFI Software reaches into the cloud with Monitis acquisition

GFI Software has acquired Monitis, a provider of cloud-based network and systems monitoring solutions. This acquisition further strengthens GFI’s ability to provide …

Practical tips for identity theft prevention

A recent Javelin Strategy & Research study found that fraud suffered by Small Business Owners (SMBO) totaled $8 billion. Banks, merchants and other providers absorbed at …

Don't miss

Cybersecurity news