Please turn on your JavaScript for this page to function normally.
2013: The year of cyber war or just cyber panic?

At the end of the year experts at G Data SecurityLabs are taking a moment to look both back and forward at IT security, attacks and cyber crime. In 2012, online criminals were …

ENISA reports on smart grid cyber security measures

The EU’s cyber security agency ENISA has investigated the challenges for baseline smart grids protection in Europe. This new report assists smart grid providers to …

Nmap 6: Network exploration and security auditing cookbook

Nmap 6: Network exploration and security auditing cookbook will help you master Nmap and its scripting engine. You will learn how to use this tool to do a wide variety of …

Splunk releases Java and Python SDKs

Splunk announced new software development kits (SDKs) for Java and Python. SDKs make it easier for developers to customize and extend the power of Splunk Enterprise, enabling …

Dell acquires Credant Technologies

Dell has reached an agreement to acquire Credant Technologies, a provider of data protection solutions to control, manage and secure data sent from endpoints to servers, …

Java apps can now be prevented from running in the browser

Oracle has released the newest version of its Java SE Development Kit (JDK 7u10), and apart from patching a few bugs, it has also introduced a couple of welcome changes that …

Who has access to your network and data?

GFI Software released guidelines for businesses ahead of the end of year holiday period, traditionally a time when many office-based businesses close for the festive season, …

56 alleged members of card fraud ring arrested in Europe

56 suspected members of a major network of payment card fraudsters (38 in Bulgaria, 17 in Italy and 1 in the Netherlands) have been arrested in a coordinated raid across …

14,000 Indian websites hacked in 2012

It has been reported that over 14,000 Indian websites have been hacked by cyber criminals this year, an increase of nearly 57 percent from 2009. Barry Shteiman, Senior …

Fluke Networks increases BYOD device visibility

Fluke Networks announced a new BYOD Classification capability that reduces the cost and time needed to optimize and secure a wireless network for authorized and unauthorized …

Get ready for invited break-ins, malware-ridden apps and spoof attacks

It’s that time of year again when, it seems, every technology vendor suddenly becomes clairvoyant with an insatiable urge to predict the battles we need to arm ourselves …

Blue Coat acquires Crossbeam Systems

Blue Coat Systems has entered into an agreement to acquire Crossbeam Systems. The acquisition is expected to close on December 31, 2012. “Our service provider and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools