Please turn on your JavaScript for this page to function normally.
Week in review: Link between Flame and Stuxnet discovered, and cracking LinkedIn passwords

Here’s an overview of some of last week’s most interesting news, reviews and articles: Lessons learned from cracking 2 million LinkedIn passwords Like everyone …

SAP security vulnerabilities, metrics and threats

A global report from ERPScan dedicated to SAP security shows various critical services exposed by 5%-25% (depending on the service) of companies that run SAP. One of the goals …

Ghost USB honeypot released

Ghost is a honeypot for malware that spreads via USB storage devices. It detects infections with such malware without the need of any further information. The honeypot …

IT leaders want greater insight

Only 44% of IT decision makers say the line levels of IT feel connected to their organization’s strategy and are empowered to execute it, according to TEKsystems. A …

Cloud-based endpoint security with protection for Exchange Server

Panda Security released Panda Cloud Office Protection Advanced, a cloud-based endpoint security solution with protection for Exchange Server. This new module is fully …

Data privacy protection for Hadoop

Dataguise released DgHadoop, a data privacy protection and risk assessment solution for Hadoop. It provides compliance assessment and enforcement for centralized data privacy …

BoxCryptor: Cloud storage encryption

BoxCryptor allows you to encrypt entire folders using the AES-256 standard. Any file stored in the virtual BoxCryptor drive is individually encrypted and stored in the …

BYOD influences enterprise mobile security

The rapid proliferation of consumer mobile devices is changing the traditional IT environment in enterprises, as 90 percent of enterprises have already deployed mobile …

CEOs lack visibility into seriousness of security threats

CORE Security exposed the division that exists between the CEO and Chief Information Security Officer (CISO), on how they view threats to IT Infrastructure security. The …

Free mobile security eBook from Veracode

Veracode released a free eBook that outlines the ten steps that can be taken by individuals and organizations to protect against potential security risks brought on by the …

Security tips to combat mobile device threats to healthcare

Mobile devices are increasingly exposing protected health information (PHI) in the healthcare space, with threat risks growing, according to the Department of Homeland …

Insider threat as prime security concern

Cyber-Ark Software revealed the findings of its annual “Trust, Security and Passwords” report. Whilst the research reveals a growing awareness of external threats …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools