In wake of breach, eBay has to deal with multiple web vulnerabilities
As eBay flounders while trying to adequately respond to the breach it disclosed last week, and deems weak passwords to be good but stronger ones to be weak, researchers are …
Week in review: eBay breach, Linux Trojans, US charges Chinese military hackers for spying on US firms
Here’s an overview of some of last week’s most interesting news, podcasts, and articles: Record month for Linux Trojans If you think that you are protected from …
China will start screening IT products
The Chinese government has announced that it will start vetting IT products and services that are to be used on networks and systems important to national security and public …
Anti-surveillance mask foils facial recognition systems
The unnerving ubiquity of security cameras in public places and the fact that an increasing number of them are connected to facial recognition systems has spurred …
Google Image Search results redirect to Browlock ransomware
Browlock is the most basic approach to ransomware there is: there is no actual malware that blocks the victims’ computer or encrypts its contents, there is only a Web …
Facebook introduces privacy check up tool
Facebook continues on its course to give users more privacy by making “Friends” the default sharing option for first time posters, and by introducing a privacy …
Netwrix extends auditing visibility into SharePoint changes
SharePoint has become a popular business application for storing data, sharing content and powering websites. For many organizations, it is the core of their collaboration …
What is the key to IT program management?
The ability to categorize IT programs and assign them appropriate tactics, skills and resources is critical to the generation of positive outcomes, according to Gartner, inc. …
Trust in the U.S. cloud on the decline
Perspecsys revealed a continental cloud divide between the U.S. and Europe, based on data findings from a study it conducted at Infosecurity Europe 2014. Perspecsys surveyed …
POS facial recognition can prevent fraud
Lately, the news has been filled with stories of identify fraud. This, paired with the increase in mobile payments, furthers the need for companies to have access to enhanced …
Mobile app for single sign-on access to thousands of applications
Ping Identity announced a native mobile application that delivers single sign-on (SSO) access to thousands of applications from any device. Available for iOS and Android, the …
CERN, MIT scientists launch Swiss-based secure webmail
Last week marked the beta release of yet another encrypted, secure email service, and interest for it was so overwhelming that its developers had to temporarily close the …
Featured news
Resources
Don't miss
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
 - A new way to think about zero trust for workloads
 - Heisenberg: Open-source software supply chain health check tool
 - Securing real-time payments without slowing them down