Please turn on your JavaScript for this page to function normally.
Despite concerns, smartphone hotspot adoption grows

Sixty-two percent of smartphone users leverage their devices’ hotspot capabilities, an increase of nine percent since May 2012, according to a new uSamp survey of more …

EU proposes to make data breach disclosure mandatory

The European Commission has today announced the launch of new proposals that include a requirement for EU member states to appoint an independent CERT and pivotally calls for …

F-Secure Client Security updated with threat detection technology

As the cost of cybercrime continues to soar, affecting businesses around the world, F-Secure is introducing the latest version of its corporate endpoint security product, …

BYOD is increasing IT frustration and loss of control

IT is concerned about rising mobility costs and feeling frustration and loss of control over BYOD, according to iPass and MobileIron. The majority of survey respondents (57 …

Aegis Bio: Encrypted USB 3.0 drive with biometric fingerprint access

Apricorn announced the Aegis Bio 3.0, a software-free biometric USB 3.0 drive that safeguards data with secure fingerprint access and military grade 265-bit AES-XTS hardware …

Information security: Understanding a global picture in a local context

“Think globally, act locally” is a phrase now cliche because it expresses an incontrovertible and immediately graspable truth. The global/local concept applies …

Cyber risk perceptions revealed

A survey of perceptions about cyber risk found that among corporate executives, more are concerned about cyber threats than about other major business risks. More than 85% of …

Nearly a third of all computers are infected with malware

PandaLabs released its annual security report which details an extremely interesting year of data theft, social networking attacks and cyber-warfare. The most devastating …

RedSeal 6.5 supports BYOD, SIEM and risk metrics

RedSeal Networks released the latest version of the RedSeal Platform to protect companies and government agencies from attacks across the network. “In an ideal world, …

Examining the Nap malicious downloader

We recently encountered a stealthy malware that employs extended sleep calls to evade automated analysis systems capturing its behavior. It further makes use of the fast flux …

List of products affected by the vulnerable Broadcom UPnP stack

Recently, DefenseCode researchers have uncovered a high-risk Broadcom UPnP stack remote root vulnerability. The vulnerability is located within the wanipc and wanppp modules …

Fear of government snooping hinders cloud adoption

Almost half of IT experts are deterred from keeping sensitive data in the cloud because of fear of government intervention and possible legal action, according to Lieberman …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools