UK businesses worst in Europe at protecting information
Mid-sized businesses in the UK are Europe’s worst performers when it comes to managing information risk, according to research from Iron Mountain and PwC. The study …
Identify and block mobile malware on enterprise networks
Sourcefire announced new advancements for delivering visibility and control to help enterprises protect against threats that result from mobility and Bring Your Own Device …
Anti-theft system for PCs and Android devices
Bitdefender launched an anti-theft system for PCs and Android devices that turns the tables on thieves, giving you control over your phone, laptop or tablet even when …
Apps on iOS 6 will require explicit permission to access personal data
Users of Apple devices equipped with the upcoming iOS version 6 will be explicitly warned when the app they are trying to install asks permission to access their contacts, …
Democratic govts not immune to censorship attempts, says Google
Judging by the numbers contained in Google’s latest bi-annual Transparency Report, governments and government officials around the world have lately been approaching the …
Unpatched Microsoft flaw actively exploited in the wild
When Microsoft released a security advisory detailing a critical flaw in Microsoft XML Core Services and its corresponding “Fix it” mitigation solution last week, …
Six arrested for peddling Android malware in Japan
Six men – among which are three IT executives – have been arrested in Japan for having allegedly used Android malware to “earn” themselves over 20 …
Increase in cyber threats and sabotage on critical infrastructure
The Pacific Northwest National Laboratory (PNNL), in conjunction with McAfee, revealed a report that fully examines the current challenges facing critical infrastructure and …
US-CERT warns of Intel CPU flaw
A flaw in Intel chips leaves users of a number or x64-based operating systems vulnerable to system hijacking, the US Computer Emergency Readiness Team warns. “Some …
Highest paying IT certifications
ISACA’s Certified Information Security Manager (CISM) and Certified in Risk and Information Systems Control (CRISC) credentials have been named two of the highest-paying …
Real life examples on hackers bypassing CAPTCHA
Computer-assisted tools and crowd sourcing can easily bypass traditional anti-spam solutions, forcing CAPTCHAs to evolve to address these techniques, according to Imperva. A …
Predicting Malicious Behavior
Predicting Malicious Behavior combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous