Changing nature of DDoS attacks
The volume of packets-per-second (PPS) has almost quadrupled compared to Q3 2010, illustrating a significant increase in the size and diversity of DDoS attacks over the past …
DevilRobber Trojan returns, masquerades as PixelMator
DevilRobber, the latest Trojan to target Mac users, got updated. As you may remember, the previous incarnation stole Bitcoins from the user’s wallet file, used the …
Personal electronic signatures for everyone
DocuSign Ink helps consumers finish personal business faster by eliminating once and for all the hassles and costs of printing, faxing, scanning, and overnighting signed …
Change management leads to security breaches
75% of organizations believe their current change management processes could put them at risk of a security breach, according to Tufin. Having sampled 100 network security …
Why do companies backup infrequently?
Businesses are on average backing up to tape once a month, with one rather alarming statistic from the same survey showing 10 percent were only backing up to tape once per …
Teach children about online protection
In an effort to facilitate effective parent-child dialogue about Internet dangers, Trend Micro developed an eGuide with tips to help families have “The Talk” about …
nCircle PureCloud: Network security scanning service
nCircle announced PureCloud, a network security scanning service which combines security technology used by thousands of the world’s largest enterprises and government …
Mac OS X Lion: The Missing Manual
With Lion, Apple has unleashed the most innovative version of Mac OS X yet – and once again, David Pogue brings his humor and expertise to the #1 bestselling Mac book. …
Hearing on draconian new U.S. piracy legislation is under way
Today’s the day of the long awaited House Judiciary Committee’s hearing on the Stop Online Privacy Act (SOPA) and, as the Electronic Frontier Foundation claims, …
Facebook trims response to data requests
After the possibility to request data from Facebook under European data privacy laws became common knowledge, Europeans began inundating the social networks with requests. …
Top requirements for operating data in the cloud
The Cloud Security Alliance (CSA) Cloud Data Governance (CDG) working group today introduced the results of its Cloud Consumer Advocacy Questionnaire and Information Survey. …
Effectiveness of web application firewalls
The best defense against web application vulnerabilities and threats is to professionally train Web Application Firewalls (WAFs) and to incorporate Dynamic Application …
Featured news
Resources
Don't miss
- LLMs can boost cybersecurity decisions, but not for everyone
- The unseen side of malware and how to find it
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!