Risk study identifies top pain points in 2013
The state of endpoint risk is not improving according to the fourth annual report researched by the Ponemon Institute. IT professionals reported the flood of mobile devices …
Three major impacts when moving to a BYOD policy
Seventy percent of respondents in a recent survey by Gartner, Inc. said that they have or are planning to have BYOD policies within the next 12 months to allow employees to …
Guidance Software unveils fast forensic bridge
Guidance Software announced the Tableau T35u USB 3.0 forensic SATA/IDE bridge for forensic imaging in both lab and field environments. The T35u supports write-blocked, …
Sendmail and Mimecast partner on hybrid-cloud email security
Sendmail and Mimecast announced a new partnership that provides additional enhanced options for integrating and configuring email management solutions, which are needed to …
Three out of every four malware infections are caused by Trojans
PandaLabs analyzed the IT security events and incidents from July through September 2012. The third quarter of the year has seen an increase in the number of hacking attacks …
Handy malicious domain registering service available to cybercriminals
Despite its illegal nature, the industry revolving around cybercrime follows the same rules characteristic for any human economic enterprise: those who discover a need, create …
Facebook and Google+ are prime targets for easy attacks
The law created to protect children’s online privacy actually increases risk, according to new research from Polytechnic Institute of New York University (NYU-Poly). The …
Researcher releases a slew of MySQL and SSH exploits
Security professional Nikolaos Rangos, who is better known by his online handle Kingcope, has flooded the Full Disclosure mailing list over the weekend with information and …
Employees use file sharing services despite bans
Large numbers of employees use Dropbox and other consumer file sharing services for sensitive work-related data, even if they know that their employer has a specific policy …
Would you dump your network provider after a security breach?
Compromised security – rather than high monthly fees – would be the biggest catalyst for triggering UK smartphone users to change mobile network providers. The …
Reveton impersonates FBI, claims to record users’ illegal activities
The deadly combination of the Citadel malware and the Reveton ransomware is still widely used to steal information and money from uninformed users, the Internet Crime …
Security experts debate moving critical infrastructure online
Paul Simmonds, Co-Founder of The Jericho Forum, has suggested that companies attempting to reduce costs by moving critical systems online could be opening themselves up to …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous