Please turn on your JavaScript for this page to function normally.
New Linksys Smart Wi-Fi Routers with AC technology

The Linksys Smart Wi-Fi Router AC 1200 and AC 1750 are available immediately and the Linksys Smart Wi-Fi Router AC 1600, model EA6400, is planned for availability in late May. …

Why we need security awareness training programs

Lately, some of the smartest people in infosec decided that security awareness trainings are a waste of time. Last out is Bruce Schneier, who decided to speak up against …

Free firewall configuration search tool

SolarWinds released its new Firewall Browser free tool, which enables IT professionals to easily troubleshoot firewalls and manage change requests from the convenience of the …

How cybercriminals can target you on public networks

The widespread use of mobile communication, including cell phones, laptops and tablets, makes consumers particularly vulnerable to fraud and malware risks over public internet …

Sophisticated Apache backdoor in the wild

ESET researchers, together with web security firm Sucuri, have been analyzing a new threat affecting Apache webservers. The threat is a highly advanced and stealthy backdoor …

Reported DDoS attacks up 200 percent

A new Akamai report provides insight into key global statistics including connection speeds, attack traffic, and network connectivity and availability, among many others. …

Week in review: CISPA, AP Twitter account hijacking and real-world consequences

Here’s an overview of some of last week’s most interesting news, reviews and articles: World’s largest bitcoin exchange under DDoS attack Mt.Gox, the …

Phishing attacks skyrocketing

A new phishing survey by the Anti-Phishing Working Group (APWG) reveals that phishers are breaking into hosting providers with unprecedented success, using these facilities to …

35% of businesses experienced a DDoS attack in 2012

When DDoS attacks hit, organizations are thrown into crisis mode. From the IT department to call centers, to the boardroom and beyond, it’s all hands on deck until the …

Data breaches increase IT budgets

Protecting brand reputation and observing security best practices should be organisation’s primary motivators for data protection, while meeting compliance requirements …

Hosted virtual desktops can increase security

One of the most commonly cited motivations for implementing hosted virtual desktops (HVDs) is to increase the security of end-user computing, according to Gartner. Properly …

Software for complex Android device security needs

Wind River has introduced three Solution Accelerators for Android Security that allow developers to quickly begin working on security requirements for Android-based devices. …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools