BYOD security for cloud Wi-Fi access
AirTight Networks introduced device fingerprinting techniques in its SpectraGuard Enterprise WIPS and AirTight Cloud Services that provide BYOD security and detection, …
Fake online streaming service phishes and robs users
With high-speed Internet being now a common enough thing in many parts of the world, many users have taken to watching films and videos via online streaming. Unfortunately, …
China escalating Tibetan cold war into cyberspace
AlienVault has discovered a range of spear phishing attacks taking place against a number of Tibetan organizations, apparently from Chinese attackers. The attacks signal a …
Machine Learning for Hackers
If you’re an experienced programmer interested in crunching data, Machine Learning for Hackers will get you started with machine learning—a toolkit of algorithms that …
Microsoft patches seven distinct vulnerabilities
We have a total of six bulletins from Microsoft this month, addressing seven distinct vulnerabilities. It’s a pretty light month, but all of your focus should be on …
Apple fixes 83 vulnerabilities in Safari
Apple issued a patch for Safari, fixing 83 vulnerabilities, 72 of which were rated critical. Since Safari and Chrome both use WebKit, the open-source browser engine, it allows …
19-year-old wins UK Cyber Security Challenge
Computer sciences student Jonathan Millican from North Yorkshire is the winner of the latest edition of the UK Cyber Security Challenge, having successfully passed a number of …
Data protection risks on mobile devices
An increasing number of professionals (80 percent) work remotely and rely on personal devices such as smartphones (63 percent), iPads (30 percent) and laptops (80 percent) to …
Dell to acquire SonicWALL
Dell has signed a definitive agreement to acquire SonicWALL, a provider in advanced network security and data protection. SonicWALL expands Dell’s growing security …
Eliminating the need for multiple passwords
OneID announced the developer release of its service that eliminates the need for multiple usernames and passwords. Using the OneID service, consumers can sign in to websites …
Big gaps in backup plans
Small businesses are using a variety of technologies to back up data including some antiquated methods that leave the backup process incomplete and susceptible to information …
LogRhythm and Solera Networks announce a technology partnership
LogRhythm and Solera Networks announced a technology partnership to provide customers with network visibility, security and situational awareness by combining …
Featured news
Resources
Don't miss
- What types of compliance should your password manager support?
- What 35 years of privacy law say about the state of data protection
- 40 open-source tools redefining how security teams secure the stack
- Password habits are changing, and the data shows how far we’ve come
- Product showcase: Tuta – secure, encrypted, private email