Please turn on your JavaScript for this page to function normally.
More malicious attacks on the Threat Horizon

The Information Security Forum (ISF) is warning of an increase in malicious threats including attacks from organised crime and industrial espionage, along with a rise in …

Malware growth at a higher level than ever before

In its 2008 first half data security summary, F-Secure reports malware growth rate at a higher level than ever before. This recent explosion of malware doesn’t …

New book: “Your Brain: The Missing Manual”

Your Brain: The Missing Manual is a practical look at how to get the most out of your brain — not just how the brain works, but how you can use it more effectively. What …

Multiple vulnerabilities in Ruby

Multiple vulnerabilities in Ruby may lead to a denial of service (DoS) condition or allow execution of arbitrary code. With the following vulnerabilities, an attacker can lead …

Research pinpoints how institutions should respond to data breaches

Javelin Strategy & Research announced today results from a new study covering data breach victims, which highlights the acute awareness among consumers about data …

Lack of visibility and control puts enterprise network resources at risk

Nearly 50% of enterprises believe employees and non-employees have access to data that is not relevant to their job function according to a recent survey the company …

New mobile antivirus and firewall solutions

Sybase iAnywhere today announced that it has expanded its mobile security portfolio to include handheld antivirus and firewall capabilities. Sybase Information Anywhere …

The demand for RFID and biometric security solutions

Government and security agencies worldwide increasingly demand high-tech solutions to secure their borders. In response, the security industry is developing technology that …

Shocking data privacy abuse by UK businesses

UK businesses are giving out highly personal and confidential details about their customers to third parties in a bid to boost sales reveals a new survey by StrongMail of 900 …

Threat of an embedded security disaster

For many years, embedded systems have been quietly working behind the scenes of almost all modern technologies, from automobiles to factory floors to space exploration …

Scandal of snooping IT staff

Whilst you sit there innocently working away, little do you realize that a third of your IT colleagues have been snooping around the network, looking at highly confidential …

Improving bandwidth efficiency for Cisco and FortiNet firewalls

GISS has released FirePlotter version 1.4, a quick-to-install and easy-to-use Windows application that lets IT Managers, support staff and firewall engineers monitor all the …

Don't miss

Cybersecurity news