BYOD governance, security and privacy issues
Even IT professionals tasked with securing corporate data would be concerned about the privacy of their personal information if mobile device management (MDM) software were …
Compromised online accounts for sale
The recently unearthed website of a service specializing in selling access to compromised email and social networking accounts of Russian and Ukrainian users offers a …
Trend Micro Mobile Security 8.0 released
Trend Micro launched Trend Micro Mobile Security (TMMS) 8.0 which enhances the enforcement of existing password and encryption policies as well as provides more granular …
Spear phishing targets one in two organizations
Proofpoint announced findings from a survey of security IT enterprise decision makers, about email and information security trends. Key findings include: Spear phishing is an …
Encryption for Microsoft Office 365
CipherCloud unveiled CipherCloud for Office 365, a cloud encryption gateway that transparently encrypts all email message, calendar, and contact data stored in …
When employees leave so does your data
One in three (32%) employees have taken or forwarded confidential information out of the office on more than one occasion, according to Iron Mountain. When people change jobs, …
D-Link releases Cloud Camera 5000 with pan and tilt
D-Link announced its D-Link Cloud Camera 5000 (DCS-5222L), which offers a round-the-clock surveillance solution with 720p HD recording, smooth pan/tilt and digital zoom …
Metasploit Pro increases vulnerability management efficiency
Rapid7 introduced the means to increase vulnerability management efficiency by leveraging intelligence from its penetration testing solution, Metasploit Pro, to validate …
Real-time fraud prevention with PhoneID Contact
TeleSign announced the newest product in the PhoneID suite, which helps online businesses block fraud by delivering name and address details based on a phone number. PhoneID …
Spam for Dropbox users raises speculations about breach
European Dropbox users have been inundated with spam advertising gambling websites, prompting speculations about a possible breach of the company’s systems. The news …
Energy grids are prime attack targets
The electrical power grid is the backbone on which everything else depends. A cybercriminal could debilitate a major city by a single targeted attack on the energy grid and …
Android malware is booming
Trend Micro’s January prediction that some 11,000 pieces of Android malware will be detected by June this year has proved completely inaccurate, as the number of …
Featured news
Resources
Don't miss
- Brute-force attacks hammer Fortinet devices worldwide
- For $40, you can buy stolen police and government email accounts
- Vulnerabilities in MSP-friendly RMM solution exploited in the wild (CVE-2025-8875, CVE-2025-8876)
- AI security governance converts disorder into deliberate innovation
- Open-source flow monitoring with SENSOR: Benefits and trade-offs