CISO spending priorities revealed
According to a GDS International survey of more than 100 leading European information security professionals, investment priorities are changing. Spending to support business …
How to avoid digital dangers while traveling
It’s summer holiday season, when people pack up their smartphones and tablets, sunscreen and tank tops and set off for a change of pace. With connected devices …
Techniques malware authors use to evade detection
FireEye released a new report that reveals several techniques used by advanced malware to sidestep signature-based defenses during attacks. Today’s sophisticated, …
Cybergangs alter infrastructure abuse techniques
Phishing attack frequency declined 20 percent from Q4 2012 to Q1 2013, due to a precipitous drop in virtual server phishing attacks. APWG statistics indicate that phishing …
Real-time data analysis increases DDoS defenses
Real-time analytics are a powerful tool for identifying denial of service attacks and other cyber threats, risks and events. Prolexic recommends that the information gleaned …
Hacker expo and all-women keynote line coming to Hack In The Box
Hack In The Box has announced HITB2014 Amsterdam will feature an all-new Haxpo – a massive Hacker Expo open for free to professionals and the public. Haxpo will be …
Protegrity expands enterprise big data protection capabilities
Protegrity released the Protegrity Data Security Platform 6.5, which expands the Protegrity Big Data Protector capabilities to include support and certification on many Apache …
Panda Security updates Cloud Office Protection
Panda Security released Panda Cloud Office Protection (PCOP) 6.7, which will enable users to roll-out Panda Cloud Systems Management (PCSM) automatically on their network. …
Self-encrypted 2.5″ SATA SSD from Microsemi
Microsemi announced a secure, half-terabyte SSD for mobile video surveillance operations, SANs and other high capacity storage applications requiring superior real-time data …
Researchers hack femtocells, record mobile phones’ calls, SMS traffic
Intercepting voice calls, SMS messages, and web traffic coming and going from a target’s mobile phone may be as simple as waiting for his phone to associate to a …
Snowden given asylum by Russia, leaves Moscow airport
NSA whistleblower Edward Snowden has been granted temporary asylum in the Russian Federation and has left the transit zone of Moscow’s Sheremetyevo airport, RT reports. …
Free first aid kit for computer viruses
Avira launched the Avira Rescue System, a software first aid kit for scanning and repairing PC computers that are already infected with malware. It can be downloaded for free …
Featured news
Resources
Don't miss
- Windows 10: How to get security updates for free until 2026
- XBOW’s AI reached the top ranks on HackerOne, and now it has $75M to scale up
- Why the SOC needs its “Moneyball” moment
- From posture to prioritization: The shift toward unified runtime platforms
- Why should companies or organizations convert to FIDO security keys?