Security case for iPhone 4
BungeeAir is based on a wireless technology that instantly creates a connection between your iPhone and a compact key fob to create a security tether keeping your phone and …
LockDown: USB 3.0 password protected HDD enclosure
Satechi introduced LockDown, a portable external SATA hard drive enclosure that not only keeps your data securely with a encrypted 256-bit AES hardware password protection but …
Windows 8 new security features
The Internet is all abuzz with the news of the upcoming Windows 8, whose early version has been demonstrated on Tuesday at Microsoft’s BUILD conference. Setting aside …
65% of security pros say SIEM is dead
Two-thirds (65 percent) of senior security professionals at Global 5000 and federal organizations say traditional Security Information and Event Management (SIEM) products no …
phpMyAdmin multiple script insertion vulnerabilities
Multiple vulnerabilities have been reported in phpMyAdmin, which can be exploited by malicious users to conduct script insertion attacks, according to Secunia. 1. Certain …
Trend Micro enhances mobile security for Android
Trend Micro announced Trend Micro Mobile Security Personal Edition, a solution designed to protect Android smartphones and tablets. In January 2011, Trend Micro introduced …
Desktop virtualization approaching tipping point
Cost reduction, security, manageability and simplifying the migration to Windows 7 are driving organizations to adopt an aggressive deployment approach when it comes to …
Is this the end of the line for DigiNotar?
DigiNotar is going down quickly and in flames. After having its SSL and EVSSL certificates deemed untrustworthy by the most popular browsers, around 4200 qualified …
Russian cyber criminal steals $3.2 millions in 6 months
A Russian resident in his early 20s is believed to be the leader of a tightly knit gang using banking Trojans and money mules to earn themselves millions of dollars. The …
Majority of small businesses unprepared for data disaster
Although small businesses recognize the impact data loss could have on their business, more than half (57 percent) do not have a disaster preparedness plan for business data. …
BackTrack 5 Wireless Penetration Testing Beginner’s Guide
Wireless technologies are inherently insecure and can be easily broken. BackTrack is a penetration testing and security auditing distribution that comes with a myriad of …
Cloud service for secure managed file transfer
Cyber-Ark Software announced Inter-Business Vault as a Service, a cloud-based solution for rapidly exchanging sensitive files with external third parties. Based on its …
Featured news
Resources
Don't miss
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground
- Open source has a malware problem, and it’s getting worse
- Train smarter, respond faster: Close the skill gaps in your SOC