Americans are less concerned about security
Americans are less concerned about nearly all aspects of security than they were 12 months ago, but an overwhelming majority consider security issues very important when …
Do mobile devices in the workplace create security problems?
The role of IT managers has changed drastically in a short period of time – revolutionized by smart mobile devices and increased remote connection tools. While end users …
Adobe patches Photoshop, Illustrator, Flash and Shockwave
Adobe released four security bulletins that fix critical vulnerabilities in the following products, for both Windows and Macintosh plaforms: Adobe Illustrator CS 5.5 and …
Simplexo SDK enhances database security
A new Software Developers Kit (SDK), designed to keep all information stored in corporate databases secure, has been launched by Simplexo. Simplexo Data-Secure SDK has been …
Trend Micro releases SecureCloud key management system
Trend Micro announced a product development initiative using Apache CloudStack currently in incubation at the Apache Software Foundation, giving Trend Micro first-mover …
Avaya secures mobile collaboration and BYOD
Avaya Identity Engines 8.0 enables organizations to provide employees and guests with secure, controlled access to wired and wireless networks from their personal devices. …
Advanced threat management on high capacity networks
Fidelis Security Systems announced Fidelis XPS BladeArray as part of its Fidelis XPS network security product family. Fidelis XPS BladeArray delivers Deep Session Inspection …
MySpace charged for violating user privacy, vows to do better
Charged by the US Federal Trade Commission with violating federal law due to having shared its users’ personal information and Web browsing habits with third parties, …
Java drive-by generator used in recent attack
A malware delivery campaign that doubles its infections efforts to really make sure the users get compromised has been recently spotted by F-Secure researchers. One of them …
Privacy icons summarize privacy policies
A group of students from Yale University have shared their final project for their Control, Privacy, and Technology course which offers the novel idea of using icons to brief …
Phishing impersonating email service providers spikes
Phishing attacks impersonating email service providers increased 333 percent from Q4 2011 to Q1 2012. IID attributes this spike to spammers needing unsullied email addresses …
Cisco explores the state of cloud networking
As the role of cloud computing is growing significantly in its ability to deliver business applications, many IT decision makers are facing challenges with their existing …
Featured news
Resources
Don't miss
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground
- Open source has a malware problem, and it’s getting worse
- Train smarter, respond faster: Close the skill gaps in your SOC