Please turn on your JavaScript for this page to function normally.
Threats 2.0: A glimpse into the near future

Collaboration and socializing, flexible and movable content, interoperability – these are all things that made Web 2.0 the answer to our needs. New technologies to …

Top 10 information security threats for 2010

“The start of a new year is a great time for companies to evaluate their information security practices and begin thinking about what threats they’ll be facing in …

Continuing evolution of Internet threats

Spammers continue to be cutting-edge marketers, this time taking advantage of the reputations of global brands, such as UPS, DHL and Facebook, to prompt opening of emails. …

Adobe hacked, China to blame

In what seems to be normal news this week, Adobe became a victim of what the company is calling “a sophisticated, coordinated attack” and is actively investigating …

Chinese attacks gear Google to focus on security and privacy

Google acted correctly in ending self-censorship of its Chinese search engine, Google.cn, but the cyber attacks that prompted the decision demonstrate the company must give …

New CRISC certification for risk professionals

The Certified in Risk and Information Systems Control (CRISC) designation from ISACA is for IT professionals who identify and manage risks through the development, …

Adobe fixes critical vulnerabilities in Adobe Reader and Acrobat

Critical vulnerabilities have been identified in Adobe Reader 9.2 and Acrobat 9.2 for Windows, Macintosh and UNIX, and Adobe Reader 8.1.7 and Acrobat 8.1.7 for Windows and …

Hackers to target personal data with custom malware

AppRiver released its year-end spam and virus report. Phishing remained a consistent threat with several campaigns targeting social networking sites and mimicking major banks, …

Only 27% of organizations use encryption

According to a Check Point survey of 224 IT and security administrators, over 40% of businesses in the last year have more remote users connecting to the corporate network …

Google hacked, plans to leave China

Although it does face a variety of cyber attacks on a regular basis, Google recently acknowledged the theft of intellectual property following a sophisticated attack on their …

Software testing firm says no to responsible disclosure

One of the most debated issues in the world of computer security will soon experience a moment of clarity that will prove one of the sides right. But which? Evgeny Legerov, …

Second wave of electronic IDs in Europe

With the recent announcement that a national electronic ID (e-ID) project will be rolled out in early 2011, Poland injects optimism for further momentum in e-ID rollouts in …

Don't miss

Cybersecurity news