Cybercriminals exploit most news within 22 hours
Cybercriminals continue to respond with lightning speed when they see an opportunity to exploit a national or global news story to spread malware. In fact criminals are …
Watchful Software updates its information protection solution
Watchful Software released RightsWATCH 5.0, which extends the secure flow of information throughout an organization while automatically applying corporate security policies …
US government security background checks fumbled by investigators
Edward Snowden’s successful exfiltration of confidential NSA documents has proved that the background checks executed for government personnel in order to receive the …
Amateur hacker behind DDoS attack on China?
When, in late August, China’s Domain Name Service was targeted by a huge DDoS attack which ultimately lead to many websites being completely inaccessible for a period of …
Industry leaders perceive numerous security threats to their data
An overwhelming majority of business leaders believe their customers and clients worry about breaches of personal data held by their organizations. Unisys-sponsored research …
Organizations fear their privacy activities are insufficient
The perceived level of maturity attached to organizations’ privacy activities has decreased since 2011, as many organizations deem their existing privacy activities to …
Organizations are flying blind as they embrace cloud services
Organizations lack the information to understand and mitigate a broader set of risks posed by the use of cloud services, according to Skyhigh Networks. “What we are …
Icefog cyber espionage campaign exposed
Kaspersky Lab’s security research team discovered Icefog, a small yet energetic Advanced Persistent Threat (APT) group that focuses on targets in South Korea and Japan, …
Big data analytics for security intelligence
The Cloud Security Alliance (CSA) Big Data Working Group today announced the release of Big Data Analytics for Security Intelligence. The new research report details how the …
Amazon.com released Fire OS 3.0 “Mojito”
Amazon.com introduced Fire OS 3.0 “Mojito,” the next generation of software and services that powers Kindle Fire tablets, with hundreds of updates and new features …
Deploy endpoint encryption technologies with Wave Cloud 2014
Wave Systems launched Wave Cloud 2014, a cloud-based service for enterprise-wide management of endpoint encryption. It includes management of Windows BitLocker and Mac …
CORE Impact Pro 2013 R2 gets enhanced web services capabilities
CORE Security released CORE Impact Pro 2013 R2, that allows organizations to proactively test IT infrastructure and identify exactly where and how an organization’s …
Featured news
Resources
Don't miss
- Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257)
- FAPI 2.0: How the OpenID Foundation is enabling scalable interoperability in global healthcare
- pqcscan: Open-source post-quantum cryptography scanner
- Bitdefender PHASR: Proactive hardening demo overview
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)