Please turn on your JavaScript for this page to function normally.
Top wireless security trends for 2011

Today’s security needs are different than they were a decade ago. People are ‘connected’ thanks to mobile devices so they can stay linked to their security …

Smart grid cyber security in 2011: Untenable meets intractable

In the presentation below, you can listen to Andy Bochman, the Energy Security Lead at IBM, looking back and looking forward on smart grid cyber security. Andy takes a look at …

Metasploit achieves CVE compliance

Rapid7 announced that Metasploit Pro and Metasploit Express have achieved Common Vulnerabilities and Exposures (CVE) compliance. CVE associates unique identifiers to security …

Use Android as a RSA SecurID authenticator

RSA announced their SecurID Software Token for Android that is engineered to enable an Android powered device to be used as an RSA SecurID authenticator, providing convenient …

First 1TB 2.5-inch enterprise HDD

Seagate introduced Constellation.2, the first 2.5-inch enterprise-class hard drive to reach 1TB capacity. The drive is designed for server storage applications and offers a …

Gawker Media breach claimed by Gnosis

The credit for the breach of Gawker Media has been claimed by a group that goes by the name of Gnosis, and was apparently a way to get back at the company, its staff and its …

Data privacy a primary concern in the smart grid world

Privacy has emerged as the number one concern related to data security and management, with data governance as an emerging concern, according to IDC Energy Insights. As …

Data protection compliance in the EU administration

The European Data Protection Supervisor (EDPS) adopted a policy paper that sets out the framework within which he monitors, measures and ensures data protection compliance in …

Malware spread via Google, Microsoft ad network

A number of online ad networks – including the two largest, Google’s DoubleClick and Microsoft’s Media Network – have been found unknowingly spreading …

Gawker Media data breach linked to Twitter spam campaign

A recent security breach at Gawker Media which involved the leaking of user passwords for sites such as Gizmodo and Lifehacker, has now been linked to a widespread spam …

Multiple vulnerabilities in RealPlayer

Multiple vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user’s system, according to Secunia. Users should …

McDonald’s customer data compromised

If you previously elected to submit information to McDonald’s in connection with one of their websites or promotions, there is a possibility that information you …

Don't miss

Cybersecurity news