Data mapping and masking requirements
A new study of 3,765 publicly disclosed breach incidents shows they resulted in financial losses of more than $156 billion. Published by the Digital Forensics Association, the …
Data loss management SaaS
Co3 Systems announced an automated, repeatable way to prepare for data loss events, assess their potential impact, and generate and manage incident response plans more …
When scammers socialize
A sophisticated, seemingly broadly orchestrated online scam that promises bogus prizes like iPads or gift cards in order to dupe Internet users into giving up their …
Security case for iPhone 4
BungeeAir is based on a wireless technology that instantly creates a connection between your iPhone and a compact key fob to create a security tether keeping your phone and …
LockDown: USB 3.0 password protected HDD enclosure
Satechi introduced LockDown, a portable external SATA hard drive enclosure that not only keeps your data securely with a encrypted 256-bit AES hardware password protection but …
Windows 8 new security features
The Internet is all abuzz with the news of the upcoming Windows 8, whose early version has been demonstrated on Tuesday at Microsoft’s BUILD conference. Setting aside …
65% of security pros say SIEM is dead
Two-thirds (65 percent) of senior security professionals at Global 5000 and federal organizations say traditional Security Information and Event Management (SIEM) products no …
phpMyAdmin multiple script insertion vulnerabilities
Multiple vulnerabilities have been reported in phpMyAdmin, which can be exploited by malicious users to conduct script insertion attacks, according to Secunia. 1. Certain …
Trend Micro enhances mobile security for Android
Trend Micro announced Trend Micro Mobile Security Personal Edition, a solution designed to protect Android smartphones and tablets. In January 2011, Trend Micro introduced …
Desktop virtualization approaching tipping point
Cost reduction, security, manageability and simplifying the migration to Windows 7 are driving organizations to adopt an aggressive deployment approach when it comes to …
Is this the end of the line for DigiNotar?
DigiNotar is going down quickly and in flames. After having its SSL and EVSSL certificates deemed untrustworthy by the most popular browsers, around 4200 qualified …
Russian cyber criminal steals $3.2 millions in 6 months
A Russian resident in his early 20s is believed to be the leader of a tightly knit gang using banking Trojans and money mules to earn themselves millions of dollars. The …
Featured news
Resources
Don't miss
- How FinTechs are turning GRC into a strategic enabler
- Secretless Broker: Open-source tool connects apps securely without passwords or keys
- Product showcase: Protect your data with Apricorn Aegis Secure Key 3NXC
- Microsoft introduces protection against email bombing
- Sudo local privilege escalation vulnerabilities fixed (CVE-2025-32462, CVE-2025-32463)