Please turn on your JavaScript for this page to function normally.
70% of teens hide their online behavior

When it comes to using the Internet, teens are not only engaging in risky behaviors, but how they are hiding it from their parents, many of whom don’t realize they are …

New version of NGINX web server to support OCSP-stapling

GlobalSign, DigiCert, Comodo, and NGINX announced a joint effort and a sponsored development contract, to enhance the NGINX open source web server to support OCSP-stapling. …

Older means wiser to computer security

A new Dimensional Research and ZoneAlarm report found that 18 – 25s are more confident in their security knowledge than 56 – 65s, but have experienced more …

Hackers leak customer data after firm refuses to pay ransom

Hacking collective “Rex Mundi” has leaked a batch of personal and financial information belonging to individuals who have applied for loans with online loan …

User activity monitoring revealed

In this interview, Matthew Ulery, Director of Product Management with NetIQ, discusses the challenges related to user activity monitoring. He talks about the various methods, …

Facebook promotes security tips

If you have logged into Facebook in the last few days, chances are you have been faced with a new Facebook message at the top of your page saying “Stay in control of …

UK businesses worst in Europe at protecting information

Mid-sized businesses in the UK are Europe’s worst performers when it comes to managing information risk, according to research from Iron Mountain and PwC. The study …

Apps on iOS 6 will require explicit permission to access personal data

Users of Apple devices equipped with the upcoming iOS version 6 will be explicitly warned when the app they are trying to install asks permission to access their contacts, …

Data privacy protection for Hadoop

Dataguise released DgHadoop, a data privacy protection and risk assessment solution for Hadoop. It provides compliance assessment and enforcement for centralized data privacy …

Password security, one step at a time

Last week we saw millions of passwords leak from LinkedIn, eHarmony and Last.fm. Much has been written over the last twenty years about how to create strong passwords, but no …

Five IT security threats and how to combat them

Faced with external security threats from hackers and others, along with a growing array of even more dangerous internal security threats, companies worldwide are feeling the …

World’s first secure private mobile carrier

New revelations about abuses by social networks and search giants are only the tip of the iceberg when it comes to security threats today. Not only are these organizations …

Don't miss

Cybersecurity news