Green IT to become a priority
Green IT initiatives will take on added importance in the next few years as more organizations commit financial resources and develop comprehensive strategies, according to a …
Cybercriminals shifting to smaller, more opportunistic attacks
Data loss through cyber attacks decreased sharply in 2010, but the total number of breaches was higher than ever, according to the “Verizon 2011 Data Breach …
Easter greetings deliver malware
The days leading up to major religious holidays are when you should be more careful with the contents of your inbox. One malicious spam run recently spotted by McAfee consists …
Software industry risks and SQL injection trends
With the trend of targeted cyber attacks along with the exploitation of common vulnerabilities such as SQL injection, it is clear that the core software infrastructure of …
Managed government-level secure USB from Kingston
Kingston announced the DataTraveler 4000-M Managed (DT4000-M) USB Flash drive, a fully managed version of the company’s DataTraveler 4000 product. Specifically developed …
PCI DSS compliant companies suffer fewer data breaches
While the majority of PCI compliant organizations suffer fewer or no breaches, most practitioners still do not perceive PCI-DSS to have a positive impact on data security, …
SecureDoc 5.2: Full-disk encryption supports Lenovo Hardware Password Manager
WinMagic launches SecureDoc 5.2, the only full-disk encryption (FDE) solution to support Lenovo Hardware Password Manager (HPM) on ThinkPad laptops and ThinkCentre desktops. …
NetWrix integrates with Microsoft System Center
NetWrix released the SCOM Management Pack for Change Reporter Suite, an integrated solution for automated change auditing of the entire IT infrastructure, integrated with …
Children on social networks unaware of privacy risks
77% of 13-16 year olds and 38% of 9-12 year olds in the EU have a profile on a social networking site, according to a pan-European survey carried out for the European …
HBGary does some reputation building
A little over two months have passed from the HBGary breach, and the unfortunate incident seemed to have somewhat faded from public consciousness, supplanted by the slew of …
Gaping security hole in Skype for Android
The Skype application for Android contains a flaw that allows a rogue app to access and harvest users’ personal information and things like chat logs from the device …
Rise in ZIP file attachments in spam emails lead to Bredolab malware
On the 16th of March Rustock, the largest of the spamming botnets, was taken down. As you would expect, global spam levels started to drop, as can be seen when you look at the …
Featured news
Resources
Don't miss
- Social data puts user passwords at risk in unexpected ways
- New observational auditing framework takes aim at machine learning privacy leaks
- Why password management defines PCI DSS success
- Hottest cybersecurity open-source tools of the month: November 2025
- Gainsight breach: Salesforce details attack window, issues investigation guidance