Anonymous proxy for iPhone and iPad
NetShade makes your web presence anonymous by routing your connection through a proxy server. NetShade is a subscription service. With an account, you can use the five …
Divorce is less stressful than safeguarding confidential data
How are IT managers coping with today’s threat landscape? Are they properly protected against the latest data-stealing malware? And would employees report if they …
rCloud: Disaster recovery for virtual environments
Doyenz announced rCloud, a disaster recovery solution for SMBs that offers recovery for virtual environments. Purpose-built for VMware virtualized environments, rCloud can …
Fraud detection and cloud security from ActivIdentity
ActivIdentity introduced 4TRESS Authentication Appliance that offers multi-layered strong authentication, fraud detection and cloud security capabilities. The appliance …
Flash bug allows spying of website visitors through webcam
A slight variation of a previously designed clickjacking attack that used a Adobe Flash vulnerability has once again made it possible for website administrators to …
Which mobile OS is most hit by malware?
As most mobile phone users still don’t have a mobile AV solution installed on their devices, it can be rather hard to gauge just how many of them have been hit by mobile …
Hijacked phishing page warns users about phishing
hen you follow security news daily like I do, it is tough to keep a positive outlook when day after day you hear and read of users falling for basically the same scams simply …
Ten early warning signs of fraud
Anti-fraud consultancy UK Fraud published a list of ten common early warning signs which could alert management that fraud may be occurring in their organization. The list …
Analyze the virtual environment with vScope Explorer
vScope Explorer is a free tool that assesses the performance health of all VMs in an environment, across data centers and from multiple vCenter servers, displaying any …
SANS virtualization security course returns to London
The SANS Institute has added Security 577 Virtualization Security Fundamentals to the line-up for SANS 2011 London following popular demand. On its European début last year, …
Explore what ISO 27001 documentation looks like
Documentation is the core of your ISO 27001 implementation. A good set of documents will enable your employees to understand their obligations better while poorly written …
Free web service identifies Internet abuse
Zscaler released IPAbuseCheck, free web service which will allow them to query a dynamic ThreatLabZ database to identify whether any of their endpoint clients and IP addresses …
Featured news
Resources
Don't miss
- LLMs can boost cybersecurity decisions, but not for everyone
- The unseen side of malware and how to find it
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!