Private, secure texting app for iOS
With an estimated 6 billion text messages sent every day in the United States alone, text messaging has become the primary means of communication for a large portion of the …
SMBs are embracing cloud-based services
Cloud-based applications are forcing SMBs to balance IT requirements with employees’ needs for anytime, anywhere access to information, according to Spiceworks. …
Lulzsec hacker Davis freed, back on the Internet
Jake Davis (aka Topiary), the former Lulzsec hacker and spokesman, has been released from the Feltham Young Offenders’ Institution, where he spent 37 days following his …
Car hack attack a possible theory behind journalist’s death
The upcoming DEFCON hacking conference will have many presenters touching on a great number of subjects, including that of car hacking. Security researcher Charlie Miller, …
New specific rules target EU telecoms that lose personal data
The European Commission is putting into place new rules on what exactly telecoms operators and ISPs should do if their customers’ personal data is lost, stolen or …
U.S. senators propose new privacy bill following surveillance scandal
A group of U.S. senators lead by Senator and Chairman of the Senate Judiciary Committee Patrick Leahy have introduced a new legislation that aims to improve government …
Researchers reveal tricks for Cutwail’s endurance
While some botherders have opted for the arguably much safer P2P architecture in order to assure their botnets’ resilience, others are still clinging to the standard …
Dell Software tackles the risk of software compliance
The Dell KACE K1000 Management Appliance now includes integrated software asset management to boost software licence compliance. With this latest release, the K1000 simplifies …
Concern about cloud security is nothing new
A recent survey shows that even before PRISM news broke, six out of ten consumers were concerned about the security of storing their content in social networking and cloud …
Google implements malware scan for submissions to Chrome Web Store
Late last week, Google has announced that submissions to the Chrome Web Store will, from now on, be checked for malware. Mimicking the Android Bouncer program incorporated …
The state of risk-based security management
A new Ponemon Institute survey covers risk-based security management program governance and maturity and includes 571 U.K. and 749 U.S. respondents from the following areas: …
Nearly 200,000 new malware samples appear daily
Most companies greatly underestimate the number of new malicious programs appearing daily, and only six per cent recognize the true scale of the threat, according to B2B …
Featured news
Resources
Don't miss
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform