Please turn on your JavaScript for this page to function normally.
Hardware security modules for cryptographic protection

Thales announced that Thales nShield Solo hardware security modules (HSMs) have been integrated into Imprivata OneSign. Designed to protect cryptographic keys and sensitive …

SMS Trojan masquerading as valentine-sending mobile application

It’s Valentine’s Day, and for all of you who are getting ready to send a valentine to the special people in your life, Microsoft has a warning: be careful what …

Central management of self-encrypting hard drives

Lenovo and WinMagic announced SecureDoc for Lenovo, a full-disk encryption solution for central management of new self-encryption hard drives that meet the Opal standard …

Week in review: HBGary breach, corporate espionage and 2-step authentication by Google

Here’s an overview of some of last week’s most interesting news and articles: Hackers compromised Nasdaq’s network Hackers continue to breach systems of …

Fake scanned documents lead to Zeus infection

A new spam e-mail campaign is currently underway, and takes the form of a document scanned and sent by a Xerox WorkCentre Pro scanner: The attachment is a specially crafted …

Researcher offers free voice and text encryption app to Egyptians

The explosive situation in Egypt has mobilized many repression-hating individuals in the world to try to do something to support the country’s citizens in their efforts …

Nigerian scammers impersonate FBI agents

The so-called “Nigerian scams” have been a staple for online scammers for a while now, most of whom are located in Nigeria – ergo the name. Attempts might …

Chinese hackers behind espionage attacks hitting Western oil firms?

Hackers have targeted five international oil companies and have extracted sensitive corporate information about oil- and gas-field operations, project financing and bidding, …

What Stuxnet means for the process industry

The Stuxnet and Aurora attacks have shown us that malware development has become a professional job. These threats targeting the process industry were written by highly …

2-step authentication finally available to Google’s non-paying customers

Google’s corporate users have had the option of using two-factor (two-step) authentication for nearly five months now, and the time has finally come for non-paying …

Organizations spend 127 hours per month managing on-site security solutions

Organizations spend an average of 127 hours per month managing on-site security solutions and related problems, according to new research from Webroot. The top time thieves …

SSL certificates for Intel Core vPro processors

Entrust has added SSL certificates for Intel Core vPro processors to its large portfolio of digital certificate offerings. This new capability, core to an identity-based …

Don't miss

Cybersecurity news