XenServer 6 released
Citrix Systems released XenServer 6. As a key component of the Citrix cloud computing and virtualisation strategy, XenServer 6 brings new optimizations and improved …
Nearly 5 million military health care files stolen
Sensitive data about nearly 5 million patients has been compromised following the theft of backup tapes from an electronic healthcare app used in the military health system, …
Critical vulnerabilities triple in 2011
Adoption of mobile devices such as smartphones and tablets in the enterprise, including the “Bring Your Own Device” approach, which allows personal devices to …
Smartphone users choose convenience over security
In a revealing survey of smartphone and tablet users, the majority polled admit to not password protecting their mobile devices despite keeping them logged in to sensitive …
Content protection for Android devices
Elliptic Technologies expanded its DTCP-IP content protection offering to include support for Android used in a myriad of consumer devices, including DLNA enabled smartphones …
Mail-borne polymorphic malware soars
Approximately 72% of all email-borne malware in September could be characterized as aggressive strains of generic polymorphic malware, says Symantec in its September 2011 …
25% of tested Google Chrome extensions allow data theft
27 of a 100 tested Google Chrome extensions have been found vulnerable to data (passwords, history, etc.) extraction attacks though specially crafted malicious websites or by …
Clever phisher almost tricks PhishTank
PhishTank is an anti-phishing site run by the OpenDNS team and offers the possibility of submitting suspected phishing sites for community-based review. In short, other users …
First enterprise mobile DLP solution
Zenprise announced its Mobile Enterprise Security Framework including the mobile DLP solution for managing and securing the growing number of personally owned devices entering …
Amazon introduces Silk, a cloud-accelerated web browser
Amazon Silk introduces a “split browser” architecture that accelerates the power of the mobile device hardware by using the computing speed and power of the Amazon …
RSA Conference Europe full keynote line-up
RSA Conference announced its complete line-up of keynote speakers for the 12th annual RSA Conference Europe, taking place from 11th-13th October 2011 in London. The Conference …
WAN and network optimization API for iOS
Circadence announced an application programming interface (API) enabling WAN optimization for Apple iOS applications. The API installs into Apple mobile applications or apps …
Featured news
Resources
Don't miss
- Chinese cyber spies used Claude AI to automate 90% of their attack campaign, Anthropic claims
- A suspected Fortinet FortiWeb zero-day is actively exploited, researchers warn
- Why your security strategy is failing before it even starts
- Protecting mobile privacy in real time with predictive adversarial defense
- Los Alamos researchers warn AI may upend national security