The state of encryption in Europe
It is a well know fact that IT employees are a special breed. They may be seen as overly paranoid and sometimes very singleminded and demanding about the issue of security and …
Digital fingerprints to identify hackers
How can you retaliate against a cyber attacker if you don’t know who he is? As we have witnessed lately, attribution of an attack is quickly becoming one of the biggest …
Top 10 tips for protecting business data
According to the Federal Trade Commission, approximately nine million Americans have their identities stolen each year. Data theft is a growing issue that can cost consumers …
Rogue software details: Live Enterprise Suite
Live Enterprise Suite is a rogue security application. In order to remove it, find out what files to look for below. Known system changes: Files c:\CommonDesktop\Internet …
Basic vulnerability found in most voice encryption products
IT security blogger Notrax claims to have successfully intercepted and compromised phone calls made using 12 commercially available mobile voice encryption products. Using a …
Many cybercrimes go unreported
More than half of the 500 respondents (58%) of the 2010 CyberSecurity Watch Survey believe they are more prepared to prevent, detect, respond to or recover from a cybercrime …
Hacker attacks on healthcare organizations double
SecureWorks reported that attempted hacker attacks launched at its healthcare clients doubled in the fourth quarter of 2009. Attempted attacks increased from an average of …
Online fraud a significant revenue loss for merchants
UK merchants say online fraud is the greatest threat they face, according to the Sixth Annual UK Online Fraud Report. Merchants stated that they lost an average of 1.8% of …
iPhone application for remote desktop access
Array Networks launched the DesktopDirect iPhone Client, the first iPhone application for enterprise remote desktop access. Employees now have full-feature access on the …
Cisco Press titles for new CCNP certification exams
Cisco Press, the official publisher to the CCNP exams, brings a portfolio of learning and preparation products to the new 2009 CCNP certification exams launched recently by …
Hackers prey on Google workers’ friends
It has been discovered that the hackers who mounted the attacks on Google, Adobe and other companies recently breached, have targeted friends of employees that had access to …
Apache SpamAssassin 3.3.0 released
Apache SpamAssassin 3.3.0 is a mature, wide-spectrum, extensible email filtering package deployed by hundreds of thousands of organizations worldwide. Apache SpamAssassin …
Featured news
Resources
Don't miss
- Popular code formatting sites are exposing credentials and other secrets
- Fake “Windows Update” screens fuels new wave of ClickFix attacks
- Microsoft cracks down on malicious meeting invites
- How an AI meltdown could reset enterprise expectations
- The breaches everyone gets hit by (and how to stop them)