Please turn on your JavaScript for this page to function normally.
F-Secure enters the content cloud

F-Secure Content Anywhere synchronizes a user’s content in the cloud, making it accessible on any device, anywhere and anytime of the day. Operators will be able to …

Mobile security experts converge on Munich for Amphion Forum

The Amphion Forum, launched in the United States last year by the same entrepreneur that founded the global RSA Conferences, has established itself as the hottest event for …

Doyenz partners with Symantec to power cloud-based recovery service

Doyenz announced that its cloud-based recovery technology was selected by Symantec to power the new Cloud DR Option available as part of Backup Exec 2012. The service enables …

U.S. developing plan to regulate critical infrastructure company cyber defense

A Senate plan to boost the US government’s ability to regulate the security of companies responsible for critical industries is causing debate as to exactly how far its …

Planning for IPv6

With IPv4 network addresses close to depletion, moving to IPv6 is now business critical. This concise book helps you plan for IPv6 integration by providing a high-level …

Trojan rounds up and steals Word and Excel docs

Beware of bogus FedEx emails asking you to review a shipment notification – the attached Fedex_Invoice.exe is actually a downloader Trojan that opens you computer to …

Hungarian sentenced for hacking, blackmailing Marriot

Attila Nemeth, a 26-year-old Hungarian national who tried to blackmail Marriot International into giving him a job by stealing the company’s internal documents and …

Update on the Kelihos botnet

Reports that the Kelihos botnet is back online and that its original operators are again trying to take over its reigns have been premature, says Microsoft. “Contrary to …

The state of cyberwar in the U.S.

As a country that is used to being dominant in the more traditional sense, the U.S. has been working to come to grips with a new sense of supremacy as a result of cyber …

Quick response, quick risk?

You don’t have to look far these days to spot a QR code. From their humble beginnings in labeling and tracking parts used in vehicle manufacturing, these blocky little …

Simple steps to ensure online safety

Resent research into internet use by teenagers conducted for GFI Software revealed that one in three parents do not know if Internet safety tips are being taught to their …

Smaller DDoS attacks can be deadlier than big ones

Contrary to conventional thinking that large bandwidth cyber attacks wreak the most damage on enterprises, security experts at Radware instead found that bigger problems …

Don't miss

Cybersecurity news