IBM releases software for developing secure mobile apps
IBM announced new software to help organizations develop mobile applications that are more secure by design. Now, clients can build security into the initial design of their …
CloudProtect: Insurance for cloud computing risks
To assist companies in managing the risks associated with cloud computing, Marsh announced an insurance solution designed to protect companies against first-party losses …
RDX media with built-in encryption technology
Imation announced the availability of Imation RDX Media Secure with CyberSafe Pro Security Technology, the first RDX media with built-in encryption and cryptographic erase …
Web Application Security, A Beginner’s Guide
Web Application Security, A Beginner’s Guide imparts the hard-learned lessons and experiences of top security professionals, and provides know-how that can otherwise …
Flame abused Windows Update to spread
You have probably already heard that Microsoft released an out-of-band update that revokes three rogue certificates that were used to sign a couple of modules of the recently …
Win8’s AV will kick in after other solutions stop working
Last week, McAfee shared the findings of a year-long project that revealed that some 17 percent of all the tested PCs around the globe had either no AV software installed or …
Apple publishes iOS security guide
Apple has a reputation for being extremely reticent when it comes to discussing security in public – so much so that most of the security features their devices sport …
UGNazi attack 4chan, CloudFlare
Visitors to 4chan have recently been automatically redirected to the Twitter account of hacker group UGNazi, and an investigation into the matter revealed that the attack has …
Real-time mobile vulnerability management
Mobilisafe launched its cloud-based Mobile Risk Management (MRM) solution, enabling IT to identify and eliminate the significant risks associated with the …
Over-55s pick stronger passwords than youngsters
Despite the often repeated recommendations by security experts, most users regularly fail to choose strong enough passwords. Joseph Bonneau, a computer scientist and …
Consumers confused about data breaches
A business’s ability to protect personal information and communicate the circumstances of a data breach can impact customer loyalty and an organization’s …
Some Flame modules were signed with rogue Microsoft certificates
While investigating the recently unearthed Flame (SkyWiper) toolkit, Microsoft’s researchers have made an unwelcome discovery. “We have discovered through our …
Featured news
Resources
Don't miss
- Black Friday 2025 cybersecurity deals to explore
- Quantum encryption is pushing satellite hardware to its limits
- cnspec: Open-source, cloud-native security and policy project
- The privacy tension driving the medical data shift nobody wants to talk about
- Salesforce Gainsight compromise: Early findings and customer guidance