Prevent metadata leaks with Metadacte 2.0
Litera released Metadacte 2.0, allowing companies to prevent metadata leaks, including information sent from mobile devices. Key new features include the ability to clean …
Implications of the rise of mobile devices
CIOs and IT leaders must address three key implications of the “post-PC” era, as workforces and consumers increasingly access IT applications and content through …
Dell SecureWorks unveils new managed security services
Dell SecureWorks announced the delivery of several new managed security services for enterprises looking to achieve greater ROI and efficiency on their security infrastructure …
Microsoft fixes 28 security bugs
The Microsoft Security Bulletin Summary for June 2012 contains 7 bulletins addressing 28 security bugs. Three of the bulletins are rated “critical” and the rest …
Diablo 3 real-money auctions accessible only with authenticator
It seems that the long awaited Diablo 3 real-money auction house will finally become a reality, as Blizzard has changed its Terms of Use to make all players who want to access …
Five IT security threats and how to combat them
Faced with external security threats from hackers and others, along with a growing array of even more dangerous internal security threats, companies worldwide are feeling the …
Static analysis technology for web application security
Coverity has extended static analysis to deeply understand both source code and modern web application architecture, providing greater accuracy and remediation guidance to …
Fake Amazon email leads to exploit kit
Fake Amazon order confirmations are hitting inboxes and trying to trick recipients into following any of the links to a page serving the Blackhole exploit kit. The email looks …
Mobile workspace offers a secure Windows OS on any computer
Imation announced Stealth Zone 2.1 boot-from-USB secure mobile workspace. This new version enhances data security by making it easier and more convenient for business …
McAfee enhances its cloud security platform
The McAfee Cloud Security Platform provides a framework that allows organizations to extend their security and policy enforcement into the cloud by securing the three primary …
World’s first secure private mobile carrier
New revelations about abuses by social networks and search giants are only the tip of the iceberg when it comes to security threats today. Not only are these organizations …
Create secure web applications with Sentinel Source
WhiteHat Security announced Sentinel Source, a solution for creating secure online applications from inception to launch. With the ability to track source code development for …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous