Cyber Monday safety tips
AVG Technologies announces five tips to help consumers ensure secure online shopping. Whether from desktops, laptops, tablets or smartphones, these tips help consumers make …
Imation releases PC on a Stick mobile workspace
Imation announced beta availability of its IronKey Workspace, certified for deployment of Windows To Go. The IronKey Workspace lets organisations outfit mobile professionals …
New line of Panda Security integrated perimeter security appliances
Panda Security launched Panda GateDefender Performa eSeries, its new, unified perimeter security device that protects against all types of threats. The solution is available …
VMware vCenter Multi-Hypervisor Manager 1.0 released
VMware vCenter Multi-Hypervisor Manager is a component that enables support for heterogeneous hypervisors in VMware vCenter Server. It provides the following benefits to your …
Linux file encryption with BestCrypt
Jetico has announced BestCrypt Container Encryption for Linux 2.0, now with a simple user experience in a new GUI, plus greater stability and security. Features and benefits …
U.S. denies hacking computers in the Élysées Palace
U.S. cyber spies have allegedly hacked a string of computers inside the official residence of the President of the French Republic during the last days of Sarkozy’s …
Info about 0-day SCADA flaws offered for sale
Following in the footsteps of French Vupen Security, Malta-based start-up ReVuln has also decided to sell information about zero-day vulnerabilities to companies and …
Bogus Chase Paymentech notification carries malware
If you receive an email seemingly coming from payment processing company Chase Paymentech, think twice about opening the attachment it carries. The email purportedly delivers …
Prince William “day in the life” photo blunder reveals sensitive info
The publication of a set of pictures that were aimed at showing the everyday life of Prince William at his work at RAF Valley has inadvertently made sensitive information …
What’s the most coveted target for cyber attackers?
Despite repeated warnings, organizations are still failing to lock down the primary target of most cyber-attacks – privileged access points. Cyber-Ark labs analyzed a …
Tips for a safe online shopping season
The holiday season presents the perfect opportunity for cybercriminals to steal consumers’ information as shopping is increasingly conducted online. According to a 2011 …
Battles over online information control to escalate
The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, escalating battles over the control of online information and continuous …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)