Please turn on your JavaScript for this page to function normally.
2011 CWE/SANS top 25 most dangerous software errors

SANS and Mitre have released the CWE/SANS Top 25 Most Dangerous Software Errors list for 2011. The list was compiled with the help of a great number of security experts from a …

45 million U.S. individuals manipulate their identities

When does a little white lie become fraud? An estimated 45 million people in the U.S. have deliberately manipulated their identities in applications for credit, cell phone …

Free anti-virus technology for Amazon EC2

AVG announced free anti-virus technology for Amazon EC2 users. The preconfigured software bundled within an Amazon Machine Image (AMI) is now available on the Amazon Web …

iOS and Android more secure than PCs?

While the most popular mobile platforms in use today were designed with security in mind, these provisions are not always sufficient to protect sensitive enterprise assets …

Gannett Government Media user information stolen

The Gannett Government Media family of websites suffered a cyber attack on resulting in unauthorized access to files containing user information. The information in those …

Encrypted voice calling for the iPhone

Cellcrypt Mobile for iPhone provides voice call encryption for commercially available off-the-shelf cell phones using government-certified security through an easy-to-use …

Security vendor applauds LulzSec attacks

In an unexpected move for a security company, SecurEnvoy today said that cyber break-ins and advanced malware incidents, such as the recent DDoS attack by LulzSec, should …

Identity theft doesn’t take vacations

Identity theft is a real risk and one that is amplified during the summer months. Recent survey results indicated that, whether booking flights at home, logging on at a Wi-Fi …

Protect your computer and phone from illegal police searches

Your computer, your phone, and your other digital devices hold vast amounts of personal information about you and your family. Can police officers enter your home to search …

Privacy and data breach solutions for healthcare

Today, data breach in healthcare is a surreptitious threat, with a data breach in healthcare occurring every two days. Complicated by federal and state governments regulating …

Internet myths putting Americans at risk

Americans’ knowledge of Internet security is scattered with misconceptions and fallacies that expose PC users to a slew of online threats, according to G Data Security. …

European study unveils IT security strategies

Fortinet unveiled the findings of a survey into the IT security strategies which queried enterprise IT decision makers in France, Germany, Italy, Spain, Benelux and the UK …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools