Why more bandwidth won’t save your network
A Vanson Bourne Omnibus survey of 100 IT managers in large UK enterprises revealed the trends that will affect the WAN over the next few years as the performance of the WAN, …
Malicious spam campaign targets QuickBooks users
Intuit-themed malicious spam campaigns pop up every couple of months or so, given that the company’s tax preparation, accounting, financial management and billing …
NIST selects winner of SHA-3 competition
The National Institute of Standards and Technology (NIST) announced the winner of its five-year competition to select a new cryptographic hash algorithm, one of the …
Hackers leak 120,000+ records raided from top universities
Team GhostShell, a hacker group affiliated with Anonymous, has leaked online information from over 120,000 user accounts stolen from the databases of over 100 higher education …
UK at greatest risk of identity fraud in Europe
The UK is at the greatest risk of identity fraud throughout Europe, according to new independent research. As National Identity Fraud Prevention Month starts, a taskforce of …
Ipswitch releases WhatsUp Gold 16
Ipswitch released WhatsUp Gold 16, which comes loaded with network, server and application monitoring, automated layer 2 discovery and mapping, wireless infrastructure …
Solera Networks enhances appliance for big data security
Solera Networks announced enhancements to its DeepSee Virtual Appliance that provides visibility of network traffic—including traffic between applications running in the …
Kaspersky Mobile Security helps Android users recover stolen smartphones
Kaspersky Lab announced the addition of new features to Kaspersky Mobile Security designed to aid in the protection of data residing on lost or stolen smartphones and the …
Police raids controversial Swedish web host, Pirate Bay site is down
The Pirate Bay’s website is unreachable and has been down for over a day now, prompting speculation that Monday’s police raid of the premises of Stockholm-based …
One in three companies take compliance risks
Despite having corporate security and compliance policies and solutions in place, there is a widespread lack of confidence in their effectiveness. According to a DataMation …
Twitter account hijacking exposes easy-to-exploit security flaw
The hijacking of the Twitter account that belongs to user Daniel Dennis Jones and his subsequent investigation into the matter has revealed a Twitter security weakness that …
Bogus AT&T notification leads to phishing
Another month, another bogus AT&T notification, warning recipients to verify their email accounts or they will have them suspended: But where previous fake emails …
Featured news
Resources
Don't miss
- Building the missing layers for an internet of agents
- What security leaders should watch for when companies buy or sell a business
- Malicious Rust packages targeted Web3 developers
- Max-severity vulnerability in React, Node.js patched, update ASAP (CVE-2025-55182)
- Smart grids are trying to modernize and attackers are treating it like an invitation