Microsoft legalizes collection of user info from its free services
In a move that has not been noted by the great majority of Microsoft users, the Redmond giant has changed its Services Agreement on Friday in order to legalize the collection …
Top five tips for network protection
This year has seen a continued rise in targeted attacks and insider threats designed to steal confidential data. Nowadays, any organization that houses valuable intellectual …
Free dual-engine malware scanner
The free Emsisoft Emergency Kit 3.0 can detect and remove malware by simply starting it directly from a USB stick or CD without the need for installation. The kit comes with a …
Big data creates big jobs: 4.4 million IT jobs by 2015
Worldwide IT spending is forecast to surpass $3.7 trillion in 2013, a 3.8 percent increase from 2012 projected spending of $3.6 trillion, but it’s the outlook for big …
Self-configuring UTM security appliance from WatchGuard
WatchGuard Technologies announced that it is the first UTM security appliance vendor to offer a firewall that configures itself. The company is adding a new cloud-based …
Verdasys launches Digital Guardian 6.1
Verdasys announced Digital Guardian 6.1, an information protection platform that integrates compliance, insider threat prevention and cyber threat prevention. The release also …
Popular Android apps leaking passwords due to poor SSL
A group of researchers from two German universities claim that eight percent of the 13,500 popular, free-of-charge, legitimate Android Android apps they downloaded from Google …
First application firewall for Google Apps
CloudLock launched CloudLock Apps Firewall, which helps enterprises discover, classify and enable trusted third party mobile and web apps that require access to users’ …
Analysis of 15 million cyber attacks
A new web application attack report by FireHost offers an impression of the current internet security climate and provides statistical analysis of 15 million cyber attacks …
Increase in drive-by attacks and infected emails
In August and September 2012, the research team from Eleven, a German email security provider, recorded a significant increase in malware sent via email. The most significant …
Microsoft concludes Russian programmer didn’t operate Kelihos botnet
Following the settling of the Nitol botnet lawsuit earlier this month, Microsoft has announced on Friday that it has reached a settlement with Russian software programmer …
Britain is targeted by cyber attacks every hour
This week, Foreign Secretary William Hague revealed that “not an hour goes by when a system in the UK is not being attacked”, and not only do the hackers attempt …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits