Please turn on your JavaScript for this page to function normally.
Office workers clueless about IT in general

Many office workers are not as tech or security aware as they could be, according to a new survey. When asked what cloud computing meant, a quarter thought it was a data …

Asure ID 7 released

HID Global released Asure ID 7, the latest update to its card personalization suite of software. Asure ID 7 includes new features and enhancements to the user interface, while …

Endpoint backup, recovery and data security

i365 launched EVault Endpoint Protection (EVault EP), an integrated cloud-connected backup, recovery, and data security solution that protects endpoint devices. EVault EP not …

GFI Software solutions now available through the Intel Hybrid Cloud

GFI Software has collaborated with Intel to make GFI VIPRE Antivirus, GFI LANguard, GFI EventsManager and GFI EndPointSecurity available through the Intel Hybrid Cloud. SMBs …

Apple iOS 4.3.2 released

Apple iOS 4.3.2 is now available for iPad, iPad 2, iPhone 3GS, iPhone 4, as well as 3rd and 4th gen iPod touch users. This version fixes an issue that may have caused blank or …

Next Safari version will include do-not-track tool

Safari is the latest of the top four most popular browsers to receive a do-not-track privacy tool. So far, the feature is still being tested by developers, but if everything …

Malware silently hijacks Facebook account and adds apps

Several months ago, when the operators of the Sality P2P botnet pushed out malware that not only collected usernames and passwords and sends them to the C&C servers but …

U.S. authorities hijack botnet by substituting C&C servers

The U.S. Department of Justice and the FBI have been granted by the federal court the permission to substitute the C&C servers of the massive Coreflood botnet with …

Smart grid cyber security revenue to rise

If smart grids can realize their full potential, consumers, utilities, nations, and even the earth itself will benefit. As with nearly any new technology, the industry focus …

External cyber security risks to surpass insider threats

57 percent of global C-level executives agree that in the next one-to-three years, external threats such as cyber-criminals will become a greater security risk than insider …

WordPress.com servers breached, source code presumed copied

Automattic – the web development corporation behind WordPress.com – has suffered a root break-in and a compromise of several of their servers. “We have been …

Why stealing at a security conference is a bad idea

ISC West is one of the biggest international security conferences, and practically every inch of the expo floor has a camera or two trained on it. You would expect that such a …

Don't miss

Cybersecurity news