Does business understand IT security?
The role of IT security is still not well-understood by business, according to a new survey by Turnkey Consulting. The survey asked IT professionals about their …
Cisco expands wireless LAN portfolio
Wireless networks have become a quintessential component for businesses, providing much more than basic connectivity. With the increasing adoption of 802.11ac, organizations …
Zorenium bot can now hit iOS users as well
If all the claims included in the adverts for the multi-platform, multi-purpose piece of malware called Zorenium are true, it could very well have a considerable impact on a …
Google: We didn’t access Arrington’s Gmail account to identify leaker
In the wake of the revelation that Microsoft has accessed a blogger’s Hotmail account in order to discover the identity of an employee who leaked company trade secrets, …
Cerberus app users warned about data breach
Users of the Cerberus anti-theft Android app have been receiving warnings from the Cerberus Security Team, urging them to change their password as they have been reset in the …
Hidden crypto currency-mining code spotted in apps on Google Play
You already know that cyber criminals are using malware to make victims’ computers mine crypto currencies for them, but did you know that your phone can be instructed to …
Analysis of 244,703 DDoS incidents
NSFOCUS released its DDoS Threat Report 2013, which details attack trends and methodologies over the past year. The report includes statistical analysis and key observations …
Are cybercriminals targeting your tax return?
Iovation is advising businesses and consumers about how to protect data and personal information to avoid identity theft during tax season. As the IRS has made it more …
Infographic: A phishing email’s route through the corporate network
For years, even decades, computer security has been seen as a technical problem that requires a technical solution. In recent years, enterprises have plowed billions of …
Retailers urge adoption of PIN-based credit cards
The National Retail Federation told the Senate that it’s time for an overhaul of the nation’s fraud-prone credit and debit card system, saying banks’ …
Surveillance is driving organizations away from the cloud
A third of IT security professionals do not keep corporate data in the cloud because of fear of government snooping, with the majority of them preferring to store sensitive …
Natural Security Alliance releases specs for strong authentication standard
The Natural Security Alliance has released the newest specifications for its world first strong authentication standard. The standard defines a strong authentication method, …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous