Free anti-spam software for the Mac
Cloudmark announced the latest version of Cloudmark DesktopOne for Mac, an anti-spam solution that users can use to filter email to eliminate messaging threats, protecting …
Microsoft releases Enhanced Mitigation Experience Toolkit 4.0
Microsoft has announced the release of version 4.0 of its popular Enhanced Mitigation Experience Toolkit (EMET), a free utility that helps prevent memory corruption …
Is accessing work apps on the move destructive?
There’s a lack of mobile working policies can lead to destructive consequences for businesses, according to Ping Identity. On a regular basis, 44% of employees access up …
New regulation for ENISA, the EU cybersecurity agency
EU cybersecurity agency ENISA has received a new Regulation, granting it a seven year mandate with an expanded set of duties. ENISA’s Executive Director, Professor Udo …
Key obstacles to effective IT security strategies
Drawing on data gathered from a total of 3,037 individuals – 1,944 technicians and 1,093 executives – in the United States, Canada, United Kingdom, Australia, …
F-Secure advances fight against exploits
Exploitation of software vulnerabilities has become one of the most popular ways to gain access to users’ machines, but F-Secure is reinforcing its exploit defenses with …
U.S. tech companies sharing bug info with U.S. govt before releasing fixes
A recent report by Bloomberg’s Michael Riley has revealed that a great many U.S.-based companies are voluntarily sharing sensitive information with the U.S. national …
Guccifer hacks U.S. nuclear security agency chief
The hacker that goes by the online moniker “Guccifer” continues his crusade agains U.S. current and former government officials, and his latest victim is Neile …
Facebook, Microsoft and Apple disclose little on U.S. government data requests
The disclosure of details about the controversial PRISM program set up by the NSA has indubitably damaged the reputation of the companies involved in it, and some of them are …
British GCHQ spied on G20 delegates to gain advantage in talks
The British GCHQ has monitored computers and intercepted phone calls made by the foreign participants of two G20 summit meetings in London in 2009 and provided crucial …
Account takeover attempts have nearly doubled
ThreatMetrix announced its Cybercrime Index, a series of Web fraud data aggregated from 1,500 customers, 9,000 websites and more than 1.7 billion cyber events. In a recent …
It takes 10 hours to identify a security breach
Businesses are vulnerable to security breaches due to their inability to properly analyze or store big data, according to McAfee. The ability to detect data breaches within …
Featured news
Resources
Don't miss
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
 - A new way to think about zero trust for workloads
 - Heisenberg: Open-source software supply chain health check tool
 - Securing real-time payments without slowing them down