Social networking protection from Trend Micro
Trend Micro released Trend Micro Titanium Internet Security 2013, a new family of security software that promises to consumers “Protection Made Easy” combining …
PostgreSQL 9.2 improves performance and scalability
With the addition of linear scalability to 64 cores, index-only scans and reductions in CPU power consumption, PostgreSQL 9.2 has improved scalability and developer …
Hosted mobile device management solution from Sophos
Sophos announced the hosted version of its mobile device management (MDM) solution, Sophos Mobile Control, which allows businesses to deploy an MDM solution without any …
D-Link releases outdoor cameras with cloud services
D-Link introduced the new D-Link DCS-7010L high-definition outdoor mini bullet camera with integrated cloud services support and the D-Link DCS-7513 two-megapixel outdoor …
Windows 8 Secrets
Microsoft is introducing a major new release of its Windows operating system, Windows 8, and what better way to learn all its ins and outs than from two internationally …
Publishing firm says leaked Apple IDs came from their servers
BlueToad, a Florida-based digital edition publishing company, has announced that the recent massive Apple UDID leak originated from their own servers, and not an FBI laptop. …
Pirate Bay’s Svartholm arrested for hacking, not piracy
Well, as it turns out, the recent arrest of Pirate Bay co-founder Gottfrid Svartholm in Cambodia is a consequence of a “crime related to information technology,” …
Windows 8 users open to Flash exploits
Users who have downloaded and are using the “Release To Manufacturing” version of Windows 8 or the 90-day trial version of Windows 8 Enterprise should be aware …
11,000 Guild Wars 2 accounts hacked in ongoing attacks
The second sequel of the popular Guild Wars multiplayer online RPG by ArenaNet has been released less than two weeks ago, and player accounts are already being heavily …
New program offers pathway into cyber security field
(ISC)2 launched the (ISC)2 Young Professionals, a new group designed to help cultivate the information security workforce of the future. The pilot stage of the program will …
Who is the most dangerous cyber celebrity?
Emma Watson has replaced Heidi Klum as McAfee’s 2012 most dangerous celebrity to search for online. For the sixth year in a row, McAfee researched popular …
Apache HTTP Server set to ignore IE10’s Do Not Track request
Microsoft’s decision to make Internet Explorer 10 in Windows 8 have the “Do Not Track” (DNT) option turned on by default has stirred a heated discussion …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)