How much confidential info is left unprotected in SharePoint?
A Cryptzone security survey undertaken amongst SharePoint practitioners at the Microsoft conference in Las Vegas, reveals how many organizations have inadequate security and …
Mega plans to offer encrypted email service
With Lavabit’s closure and Silent Circle’s shutdown of its Silent Mail, the question is where to turn next for a secure email service. Prims-break.org has a few …
Android security flaw puts Bitcoin users at risk
The Bitcoin Foundation has issued a security advisory warning users that have generated their Bitcoin wallet with an Android app that their Bitcoins can be easily stolen. The …
Obama defends surveillance programs, promises more oversight
Late last Friday, US president Barack Obama has held a press conference centered mostly on US surveillance programs, the details of which have been leaked, bit by bit, by …
Protect against threats targeting Android
Palo Alto Networks’ WildFire malware analysis sandbox now is capable of analyzing Android applications in the APK file format to identify advanced threats in Android …
Fortinet expands secure application delivery product portfolio
Fortinet announced new additions to its secure application delivery product portfolio that are a result of the company’s acquisitions of Coyote Point Systems and XDN. …
The Pirate Bay releases censorship-thwarting browser
The operators of The Pirate Bay, one of the most (in)famous piracy sites on the Internet, have decided to celebrate the site’s 10th anniversary by releasing a web …
Can biometrics revolutionize mobile payment security?
With the explosion in smartphones usage, the number of payments done via mobile devices has significantly increased over recent years. As eCommerce becomes mCommerce, the …
Adoption of antivirus software on mobile devices remains low
Consumer adoption and willingness to pay for antivirus software on mobile devices is low, according to Gartner. Gartner believes that high consumer use of personal mobile …
Week in review: Tor users targeted with spyware, secure mail providers close up shop
Here’s an overview of some of last week’s most interesting news, reviews and articles: Working as an ethical hacker The majority of people in the security industry …
NSA sysadmins to be replaced with computers
NSA director and commander of US Cyber Command General Keith Alexander has announced that the intelligence agency is planning to drastically scale down the number of its …
More apps exploiting Android “Master Key” bug found
Patches for the two recently discovered Android “Master Key” bugs are still to be pushed out by many mobile carriers and device manufacturers. In the meantime, …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous