Help Net Security
Only 8% of UK organizations have BYOD policies in place
As enhanced efficiency, employee productivity and the reduced burden on IT teams continue to drive adoption of Bring Your Own Device (BYOD), a recent survey of more than 500 …
Top 10 risks found by your auditor
KirkpatrickPrice offers a list of the most common risks they find. 1. No formal policies and procedures Formal guidelines of policies and procedures help provide your …
Top 10 telecom trends for 2013
MDSL published its Top 10 Telecom Trends for 2013. 1. TEM, MDM and MAM market: further consolidation to come 2012 saw a raft of acquisitions, driven mainly by Tangoe burning …
Week in review: Android spam-spreading botnet, highest profile software failures of 2012, and data center design innovations
Here’s an overview of some of last week’s most interesting news, interviews and articles: Improving information security with one simple question Anyone who has …
Mobile malware, botnets and attacks on the cloud to rise
ESET has published its annual review of the past year’s threat trends and compiled predictions for 2013. According to the new report, the 2013 threatscape will see major …
Ten tips for mobile security
Mobile devices have become increasingly common and the markets are flooded with new applications for business and entertainment. People are using mobile devices to play games, …
Vulnerabilities in Java and Adobe to become main targets for cybercriminals
Software vulnerabilities will be the main target of cyber-criminals next year, according to a list of security trends that will dominate in 2013 by PandaLabs. “It is …
Guidance on cybersecurity, private clouds and privacy
ISACA today issued guidance on managing three top trends posing major challenges to businesses in 2013: cybersecurity threats, private vs. public clouds and data privacy. …
Sudoku puzzle generating spreadsheet carries malware
Sudoku lovers, beware! Your love for solving the popular puzzle could just be the right entrance point cyber criminals need to saddle you with information-stealing malware. …
Lancope releases new threat intelligence for detecting attacks
Lancope released new threat intelligence for monitoring global cyber attacks. Through its StealthWatch Labs Intelligence Center (SLIC), Lancope is now delivering two new …
WatchGuard enhances XCS security appliances
WatchGuard Technologies announced the availability of its enhanced Extensible Content Security (XCS) solutions for SMBs. The XCS 580 and XCS 280 provide the same trusted …
Forensic access to encrypted BitLocker, PGP and TrueCrypt containers
ElcomSoft released Elcomsoft Forensic Disk Decryptor, a forensic tool providing access to information stored in disks and volumes encrypted with BitLocker, PGP and TrueCrypt. …