Mobile communications hub with embedded encryption
API Technologies announced the new SST Secure Communications Hub (SCH) with integrated encryption. The SB1500ER Secure Communication Hub is a single, integrated device that …
Trend Micro cloud security optimized for Amazon Web Services
Amazon Web Services (AWS) customers are able to take advantage of optimized security solutions from Trend Micro for their AWS deployments, including the AWS Storage Gateway. …
UN atomic energy agency confirms breach into its server
It has been confirmed that the email addresses recently leaked by anti-Israel hacker group “Parastoo” have been stolen from a server belonging to the International …
Bogus Amazon account compromise notice leads to phishing
A phishing email impersonating Amazon is hitting users’ inboxes, trying to trick them into believing that various computers connected to their Amazon account and …
Essential safe shopping tips
Based on Kaspersky Lab’s world-wide insight into malicious software and online scammers, the company offers the following 10 warnings and tips for online shoppers: …
Unencrypted payment data on business networks at 70%
SecurityMetrics published its second annual Payment Card Threat Report revealing unencrypted PAN (Primary Account Number) storage remains alarmingly high. Virtually no change …
Top 5 security threats for 2013
The Information Security Forum announced their forecast of the top five security threats businesses will face in 2013. Key threats include cyber security, supply chain …
Festive but fake UPS notification leads to fake AV
Fake UPS delivery notifications hit inboxes with regularity during the entire year, and usually don’t need “special effects” to trick users into downloading …
Android security and optimization app
IObit released its Android security and optimization app – Advanced Mobile Care, designed for Android 2.2 and above. The app gives Android users a way to protect their …
Entrust solves SSL compliance challenges
Finding, managing and analyzing SSL and other digital certificates can be time-consuming, complex and expensive. To help automate and simplify these tasks, Entrust introduces …
Virtualization Security: Protecting Virtualized Environments
Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and …
16 arrested for $25M worth credit card theft, fraud
Sixteen individuals allegedly involved in a credit card information theft ring have been arrested in Romania during a series of raids, the Romanian Directorate for …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)