Please turn on your JavaScript for this page to function normally.
Britain is targeted by cyber attacks every hour

This week, Foreign Secretary William Hague revealed that “not an hour goes by when a system in the UK is not being attacked”, and not only do the hackers attempt …

First European Cyber Security Month going well

Halfway through the first European Cyber Security Month (ECSM), the pilot campaign has already reached 1,986,270 people on Facebook Europe-wide. In addition, a special …

Week in review: miniFlame, Apple kills Java browser plug-in, and how to get promoted in IT security

Here’s an overview of some of last week’s most interesting news and articles: miniFlame discovered, designed for targeted cyber espionage miniFlame, also known as …

Data security and privacy stopping cloud implementations

Data security, privacy, residency, and compliance issues continue to hinder cloud adoption, with 66 percent of organizations reporting at least one cloud project that has been …

Enterprise IT supply chains will be compromised

Enterprise IT supply chains will be targeted and compromised, forcing changes in the structure of the IT marketplace and how IT will be managed moving forward, according to …

Self-service password management in the cloud

Ilantus released Password Express, a self-service password management solution with security and enterprise integration. It can be deployed in the cloud or on premise to meet …

Tips for protecting your privacy

Every month more than 5,000 people take to Twitter to complain about how their mobile device has been snooped on or their visual privacy invaded. Who can’t resist …

Dell unveils new enterprise vision

Dell announced plans to help businesses globally adopt modern, standards-based data center technologies that enable them to realize repeatable results and superior value at …

Windows 8 Administration Pocket Consultant

Portable and precise, this pocket-sized guide delivers ready answers for administering computers running Windows 8. Zero in on core operations and daily tasks using …

ModSecurity 2.7.0 released

ModSecurity makes full HTTP transaction logging possible, allowing complete requests and responses to be logged. Its logging facilities also allow fine-grained decisions to be …

Check Point unveils security appliance with 110GB/s throughput

Check Point launched its new 21600 Appliance that provides throughput of up to 110 Gbps, a 30 percent boost in SecurityPower units (SPUs) and ultra-low latency for …

Most believe free Wi-Fi can lead to identity theft

A new study by the Identity Theft Resource Center (ITRC) and PRIVATE WiFi, revealed that 79% of respondents believe that using a free Wi-Fi connection can lead to identity …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools