Please turn on your JavaScript for this page to function normally.
Exploits, security threats and hacks will mutate in 2013

Lamar Bailey, Director of Security Research and Development with nCircle, has released his top five security threats to watch out for in 2013. The New Year – and beyond …

88% of corporate databases vulnerable to cybercrime

GreenSQL revealed that 88 percent of all companies participating in its December survey do not protect their databases from both external and internal threats, and almost one …

Compliance auditing with in-depth reporting

Paws Studio is the compliance auditing tool for workstations and servers which enables organizations to produce intelligent compliance reports. It includes pre-defined …

Secure stateless tokenization for enterprises

Voltage Security announced its Stateless Tokenization (SST) technology, a patent-pending data security solution that provides enterprises, merchants and payment processors …

Apache malware targeting online banking

Analysis of a malicious Apache module, detected by ESET as Linux/Chapro.A, found that the world’s most widely used web server, Apache, is being used to carry out these …

RSA opens anti-fraud center at Purdue University

RSA, the security division of EMC, announced the opening of a new RSA Anti Fraud Command Center (AFCC) in collaboration with Purdue University. The RSA AFCC is a 24×7 …

Highest profile software failures of 2012

SQS compiled a list of the worst software failures over the past 12 months. This year’s annual survey is based on major software failures throughout 2012 and highlights …

Bans fail to prevent data leakage

TeamDrive is warning about the serious security risks being run by companies that ban document and file sharing services, such as Google Drive and Dropbox, without providing …

2013: The year of cyber war or just cyber panic?

At the end of the year experts at G Data SecurityLabs are taking a moment to look both back and forward at IT security, attacks and cyber crime. In 2012, online criminals were …

ENISA reports on smart grid cyber security measures

The EU’s cyber security agency ENISA has investigated the challenges for baseline smart grids protection in Europe. This new report assists smart grid providers to …

Nmap 6: Network exploration and security auditing cookbook

Nmap 6: Network exploration and security auditing cookbook will help you master Nmap and its scripting engine. You will learn how to use this tool to do a wide variety of …

Splunk releases Java and Python SDKs

Splunk announced new software development kits (SDKs) for Java and Python. SDKs make it easier for developers to customize and extend the power of Splunk Enterprise, enabling …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools