Windows 8 to do away with constant restarts after updating
I don’t know a single Windows user who isn’t annoyed at the number of times the operating system requires a restart, and especially annoyed when the request …
CSA offers a practical road map for secure cloud adoption
The Cloud Security Alliance (CSA) today unveiled the third version of its Security Guidance for Critical Areas of Focus in Cloud Computing. This effort provides a practical, …
Open source biometrics technology for mobile devices, PCs and servers
DigitalPersona has open sourced its new MINEX-certified FingerJetFX fingerprint feature extraction technology. FingerJetFX, Open Source Edition (OSE), is free, portable …
Cloud security best practices and tips
With the adoption of cloud computing continuing to accelerate, the need to adopt and maintain effective security and compliance practices is more important that ever. To help …
Email archive productivity headache
U.S. businesses are failing to maximize the efficiency with which they extract useful business intelligence from archived email, according to GFI Software. While a majority of …
Hiding messages in VoIP packets
A group of researchers from the Institute of Telecommunications of the Warsaw University of Technology have devised a relatively simple way of hiding information within VoIP …
RSA updates Data Loss Prevention Suite
RSA announced enhancements to its DLP Suite, a collection of risk-based data loss prevention products. The latest version offers enhancements that allow global organizations …
Expect an escalation in targeted attacks
Organizations and Internet users can expect an escalation in targeted attacks, growing social media threats and an increase in mobile malware, according to the M86 Security. …
Securely share files between PC, Mac, iOS and Android
Trend Micro released SafeSync, a tool for safe and simple synchronization. The new offering provides consumers an enhanced look and feel, simplified sync functionality and …
What hides behind the get-rich-working-from-home offers?
Do you ever get tempted to click on one of the myriad of work-from-home, get-paid-huge-money adverts that are littering the Internet? Do you ever wonder if those claims are …
Bogus chat spying Facebook app targets users
No matter how often fake “See who viewed your profile” apps are touted on Facebook, there are always users that fall for the trick and follow the steps required by …
Free webinar: ISO 9001 for ISO 27001 implementation
Most of the companies that have implemented ISO 9001 have no idea they can implement ISO 27001, this increasingly popular information security standard, with much less effort …
Featured news
Resources
Don't miss
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
- Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
- A new way to think about zero trust for workloads
- Heisenberg: Open-source software supply chain health check tool
- Securing real-time payments without slowing them down