NSA internal audit reveals thousands of privacy violations
An internal NSA audit document and several other seen by The Washington Post journalists prove that there have been over a 1,000 violations of FISA and presidential executive …
Google delivers patch for Android SecureRandom implementation
An Android security engineer has again confirmed the existence of the vulnerability that made the most popular Bitcoin wallet apps for the platform open to attack, and offered …
Is the hybrid cloud the future for enterprises?
While the public cloud remains important to IT decision-makers at UK and US enterprises, the limitations of using this type of platform as a one-size-fits-all solution are …
Panda Security launches 2014 retail line
Panda Security launched Panda Global Protection 2014, Panda Internet Security 2014 and Panda Antivirus Pro 2014. Designed to provide complete protection with minimum impact on …
Turn any iOS device into a secure mobile payment solution
SecureNet Payment Systems launched Mobile PayOS, the latest in mobile payment technology empowering merchants of all sizes to turn any iOS mobile device into a secure mobile …
Cross-platform Frutas RAT delivered via targeted emails
The cross-platform Frutas RAT is being used in a new email phishing campaign targeting high-profile finance, mining, and telecom companies as well as governments in Europe and …
Where RFI attacks fall in the security threat landscape
New research from Incapsula yielded a few interesting facts about RFI attacks. The data for the report was collected by monitoring billions of web sessions over a 6-month …
What to expect with PCI DSS 3.0
The PCI Security Standards Council (PCI SSC) published PCI Data Security Standard (PCI DSS) and Payment Application Data Security Standard (PA-DSS) 3.0 change highlights, as a …
Secure rugged Android tablet for the government
Becrypt announced a new technology partnership with Getac to provide the first secure Android tablet solution suitable for military, defence and government and wider public …
IBM acquires Trusteer
IBM announced a definitive agreement to acquire Trusteer, a provider of software that helps protect organizations against financial fraud and security threats. Financial terms …
Identify unknown internal email-enabled systems
Sendmail today introduced Sentrion Rogue Email Application Control (REAC) 2.0, the first inside-threat protection application with new Big Data search capabilities to further …
Druva delivers cloud-scalable backup to datacenters
Druva announced a new deployment option for its inSync endpoint data protection platform that is designed to help large enterprises solve the scalability challenges of backup …
Featured news
Resources
Don't miss
- Windows 10: How to get security updates for free until 2026
- XBOW’s AI reached the top ranks on HackerOne, and now it has $75M to scale up
- Why the SOC needs its “Moneyball” moment
- From posture to prioritization: The shift toward unified runtime platforms
- Why should companies or organizations convert to FIDO security keys?