Please turn on your JavaScript for this page to function normally.
Cloud computing and social networking expose businesses to attacks

Business use of technology is evolving faster now than at any point in the last decade. Internet use has moved way beyond email and websites and into the realms of social …

Online protection tips

To help individuals of all ages stay safe online and protect themselves against identity theft and the repercussions of risky online behavior, RSA shared the following safe …

Apache: Authentication and authorization against an LDAP server

mod_psldap is an Apache module for leveraging LDAP services built on the OpenLDAP library and the Apache APIs, to include web based A&A, web based updates to the LDAP …

Study: Security vulnerabilities in 38% of network devices

A new report presents real-world results – including common security vulnerabilities and violations – unearthed by Dimension Data during the 235 Technology …

Formation of the Cloud Communications Alliance

Eight leaders in hosted-IP voice and data communications announced the formation of the Cloud Communications Alliance, a consortium that will drive development and adoption of …

Fake AV doorway pages in the spotlight

Fake AV has become a regular fixture of the threat landscape for quite some time now, and TrendLabs experts take a closer look at the different tactics employed on the …

Google attack objective: Source code for the single sign-on system?

The January attacks on Google and other US companies may seem to us as if they have happened ages ago, but you can be sure that they are still actively involved in the …

Real-life consequences for choosing convenience over security

Despite being aware of security threats, the risky online behavior of young adults can negatively affect their future career prospects and financial standings, while leaving …

Stop man-in-the-browser attacks with Entrust IdentityGuard Mobile

As man-in-the-browser attacks continue to siphon funds from unsuspecting businesses and consumers, Entrust delivers a new authentication method for smartphones. Entrust …

100 potential attacks per second blocked in 2009

Symantec released its new security threat report which highlights key trends in cybercrime from Jan.1, 2009 to Dec. 31, 2009. In a year bookended by two very prominent cyber …

20 critical controls interactive from SANS

The SANS Institute released its 20 Critical Security Controls online interactive, a platform built to simplify the controls and let users choose how to consume them. The …

ESET Remote Administrator 4 released

ESET announced availability of ESET Remote Administrator 4 which simplifies the deploymen and management of ESET business solutions. Key features and benefits include: …

Don't miss

Cybersecurity news