Nasdaq attackers spied on companies
The systems of the company that operates the Nasdaq Stock Market were breached many times last year, but the actual trading platform was never compromised. A subsequent …
Anonymous proxy for iPhone and iPad
NetShade makes your web presence anonymous by routing your connection through a proxy server. NetShade is a subscription service. With an account, you can use the five …
Divorce is less stressful than safeguarding confidential data
How are IT managers coping with today’s threat landscape? Are they properly protected against the latest data-stealing malware? And would employees report if they …
rCloud: Disaster recovery for virtual environments
Doyenz announced rCloud, a disaster recovery solution for SMBs that offers recovery for virtual environments. Purpose-built for VMware virtualized environments, rCloud can …
Fraud detection and cloud security from ActivIdentity
ActivIdentity introduced 4TRESS Authentication Appliance that offers multi-layered strong authentication, fraud detection and cloud security capabilities. The appliance …
Flash bug allows spying of website visitors through webcam
A slight variation of a previously designed clickjacking attack that used a Adobe Flash vulnerability has once again made it possible for website administrators to …
Which mobile OS is most hit by malware?
As most mobile phone users still don’t have a mobile AV solution installed on their devices, it can be rather hard to gauge just how many of them have been hit by mobile …
Hijacked phishing page warns users about phishing
hen you follow security news daily like I do, it is tough to keep a positive outlook when day after day you hear and read of users falling for basically the same scams simply …
Ten early warning signs of fraud
Anti-fraud consultancy UK Fraud published a list of ten common early warning signs which could alert management that fraud may be occurring in their organization. The list …
Analyze the virtual environment with vScope Explorer
vScope Explorer is a free tool that assesses the performance health of all VMs in an environment, across data centers and from multiple vCenter servers, displaying any …
SANS virtualization security course returns to London
The SANS Institute has added Security 577 Virtualization Security Fundamentals to the line-up for SANS 2011 London following popular demand. On its European début last year, …
Explore what ISO 27001 documentation looks like
Documentation is the core of your ISO 27001 implementation. A good set of documents will enable your employees to understand their obligations better while poorly written …
Featured news
Sponsored
Don't miss
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
- “0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days