Please turn on your JavaScript for this page to function normally.
Twitter gives user always-on HTTPS option

Little by little, Twitter is heading towards a full HTTPS experience for its users by adding a user setting that, when selected, makes all the activities on your Twitter …

LotusCMS multiple vulnerabilities

A weakness and multiple vulnerabilities have been discovered in LotusCMS, which can be exploited by malicious users to disclose sensitive information and compromise a …

How antivirus and antispyware help keep malware at bay

When it comes to creating Internet security threats, malware writers are masters of disguise and manipulation. They are constantly evolving their tactics to find new ways to …

Health Net suffers massive data breach

Health Net is conducting an investigation into several server drives that are unaccounted for from its data center operation located in Rancho Cordova, Calif. This …

Etsy privacy blunder makes buyers’ purchases public

Etsy, the popular online market for small scale artisans and crafters, might be on the right track for a future privacy lawsuit following last week’s unveiling of its …

Splunk 4.2 released

Splunk provides the ability for users to search, monitor and analyze live streaming IT data as well as terabytes of historical data, all from the same interface. Splunk 4.2 …

Former NSA and CIA Director advocates cyber threat transparency

The former NSA and CIA Director Gen. Michael Hayden could possibly be the last person you would expect to be advocating government transparency. However, his commentary in the …

Complexity as the leading security issue

Security complexity is the number one obstacle that organizations face today. Research from Check Point and the Ponemon Institute shows organizations struggle with a growing …

F-Secure Policy Manager 10 released

Effective security management of corporate computers and servers is all about the consistency, speed and efficiency of operations. Policy Manager 10 automates daily operations …

Critical vulnerability in Adobe Flash Player

A critical vulnerability exists in Adobe Flash Player 10.2.152.33 and earlier versions for Windows, Macintosh, Linux and Solaris operating systems (Adobe Flash Player …

Medical identity theft: The growing cost of indifference

While consumers grasp the importance of protecting their medical and personal information, few individuals take the necessary precautions to avoid medical identity theft, …

Internet Explorer 9 delivers improved security

Microsoft released Internet Explorer 9 today. This release improves security, privacy and reliability. Tracking protection. Some content on websites can be used to track your …

Don't miss

Cybersecurity news