U.S. infrastructure at risk from sophisticated cyber attacks
Nearly three-quarters of federal IT decision-makers who work in national defense and security departments or agencies say the possibility is “high” for a cyber …
Drobo FS: Data storage and protection
Data Robotics introduced Drobo FS which is designed for simple, expandable file sharing. By providing network file sharing capabilities along with automated data protection, …
Generic and behavior-based threats increasing
Sunbelt Software announced the top 10 most prevalent malware threats for the month of March 2010. The list shows the continued prevalence of Trojan horse programs circulating …
Check how secure, private and open an app is
Surfing through the Net in search of a objective review of an application can be a daunting task, and even when you find one, it usually barely touches the issues of security …
iPad, iPhone “prizes” as lures for Twitter users
Not surprisingly, spam using the Apple iPad as a lure to get users to give up personal or credit card information has began to make rounds of Twitter users. Sunbelt reveals …
Under protected corporate secrets
Enterprises are investing heavily in compliance and protection against accidental leaks of custodial data (such as customer information), but under-investing in protection …
Splunk 4.1 released
Splunk provides the ability for users to search, monitor and analyze live streaming IT data as well as terabytes of historical data, all from the same interface. Splunk 4.1 …
Healthcare industry overlooks critical gaps in data security
As the healthcare industry prepares for a major shift to electronic health records (EHRs) over the next several years, a new bi-annual report provides data that shows that …
Control Windows desktop administration rights for free
ScriptLogic introduced Privilege Authority, a free solution that allows IT administrators to maintain control of administrator rights while giving end users specific and …
Insufficient employee security training for the cloud
Symantec and the Ponemon Institute announced the findings of a joint survey of IT professionals. The survey revealed that most organizations lack the procedures, policies and …
ZeuS vs. Zeus Killer
Back at the beginning of February, we wrote about the SpyEye toolkit and its author’s intention of encroaching upon Zeus toolkit’s turf by offering a feature that …
Fake gift card scams on Facebook
Whole Foods Market, a Texas supermarket chain, has been fighting the latest gift card scam that takes advantage of the company well-known brand by offering a $500 gift card to …
Featured news
Resources
Don't miss
- 40 open-source tools redefining how security teams secure the stack
- Password habits are changing, and the data shows how far we’ve come
- Product showcase: Tuta – secure, encrypted, private email
- Henkel CISO on the messy truth of monitoring factories built across decades
- The hidden dynamics shaping who produces influential cybersecurity research