Please turn on your JavaScript for this page to function normally.
Critical vulnerabilities triple in 2011

Adoption of mobile devices such as smartphones and tablets in the enterprise, including the “Bring Your Own Device” approach, which allows personal devices to …

Smartphone users choose convenience over security

In a revealing survey of smartphone and tablet users, the majority polled admit to not password protecting their mobile devices despite keeping them logged in to sensitive …

Content protection for Android devices

Elliptic Technologies expanded its DTCP-IP content protection offering to include support for Android used in a myriad of consumer devices, including DLNA enabled smartphones …

Mail-borne polymorphic malware soars

Approximately 72% of all email-borne malware in September could be characterized as aggressive strains of generic polymorphic malware, says Symantec in its September 2011 …

First enterprise mobile DLP solution

Zenprise announced its Mobile Enterprise Security Framework including the mobile DLP solution for managing and securing the growing number of personally owned devices entering …

Amazon introduces Silk, a cloud-accelerated web browser

Amazon Silk introduces a “split browser” architecture that accelerates the power of the mobile device hardware by using the computing speed and power of the Amazon …

RSA Conference Europe full keynote line-up

RSA Conference announced its complete line-up of keynote speakers for the 12th annual RSA Conference Europe, taking place from 11th-13th October 2011 in London. The Conference …

WAN and network optimization API for iOS

Circadence announced an application programming interface (API) enabling WAN optimization for Apple iOS applications. The API installs into Apple mobile applications or apps …

Kingston introduces new ultra-secure USB flash drive

Kingston Digital announced the DataTraveler 6000 (DT6000) USB Flash drive, which protects sensitive data with FIPS 140-2 Level 3 Validation and 100-percent encryption. For …

Payment card security compliance remains problematic

Too many businesses are struggling to comply with payment card security standards, putting consumers’ confidential information at risk. According to the Verizon Payment …

Towards secure tokenization algorithms and architectures

Tokenization – the use of surrogate values for sensitive data – is all the rage. Although it is often sold as an alternative to encryption, it is at the core a …

Microsoft takes down Kelihos botnet

After having disrupted the operation of the Waledac and Rustock botnets, Microsoft has set its sights on a smaller one that is thought to be an attempt to rebuild the Waledac …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools