Please turn on your JavaScript for this page to function normally.
Global IT-related risk framework

ISACA released Risk IT, the first global IT-related risk framework to provide a comprehensive view of the business risks associated with IT initiatives. Available as a free …

Top 15 most common security attacks

The latest in the Data Breach Investigations Report series by Verizon Business security experts provide a look at the 15 most common security attacks and how they typically …

FIFA World Cup related scams

It should be universally know by now that hot news and big events are almost always used by spammers, phishers and peddlers of scareware to reach the widest audience possible. …

Advances in surveillance, more attacks on the horizon

Slashed budgets and reduced staffing numbers delayed many security initiatives in 2009, but the vulnerabilities didn’t retreat and will only intensify in 2010, Unisys …

Fake fingerprint fools biometric devices

Japan saw its first case of biometric fraud come to light when they arrested Lin Rong, a 27-year old Chinese woman, on account of her faking a marriage to a Japanese man. BBC …

Microsoft releases six security bulletins

In today’s Patch Tuesday, Microsoft delivers 6 bulletins that fix vulnerabilities targeting Windows, Office and Internet Explorer. Jason Miller, Data and Security Team …

Social media a playground for cybercriminals

Cisco today issued its Annual Security Report for 2009, which highlights the impact of social media, particularly social networking, on network security and explores the …

Conficker worm to become a bigger threat in 2010

Although Microsoft offered a $250,000 reward for information leading to the identities of the cybercriminals behind Conficker, the worm continues to wreak havoc. Since its …

Free Wi-Fi network scanner for Windows

inSSIDer is a free Wi-Fi network scanner for Windows Vista and Windows XP. What’s unique about inSSIDer? Use Windows Vista and Windows XP 64-bit. Uses the Native Wi-Fi …

Corporate information security comes under attack

More than ever, information is regarded by business and corporations as a highly valuable, tangible asset. Unfortunately, this value is also recognized by sophisticated groups …

5 key security trends for the next decade

Imperva predicts five key security trends to watch for over the next ten years. 1. The industrialisation of hacking There is a clear definition of roles within the hacking …

Network security IPS with zero-day malware protection

The McAfee Full Spectrum Network Defense solution delivers day-zero malware detection, network threat behavior analysis, and application-level security. The solution includes …

Don't miss

Cybersecurity news