Search

Filter:

Search Results

Federal agencies score low on cyberdefense assessment report

agencies continue to have a lax culture and poor security provisions to repel the growing threat from ...

The corporate spy on your phone

While mobile devices are much more powerful than they used to be, they are also more vulnerable to malware and other security threats. That is the view of security researchers Victor Chebyshev and Roman Unucheck with Kaspersky Lab. "The more [a mobile device] can do, the more attractive ...

Bloatware blues not limited to Lenovo

For more:- check out this article at Forbes Related Articles: Lenovo to eliminate bloatware from consumer PCs after Superfish debacle Code used in 'Superfish' found in more apps  [FierceITSecurity] ...

Key IT certifications gain weight in tight salary climate

and certification trends. Reynolds told FierceCIO that cloud and security related skills in particular are costing IT managers more, and earning IT pros the larger pay premiums. Still, "Certifications abound ...

Globo targets new secure mobile app development platform at regulated industries

targeted at security-conscious firms in regulated industries, such as the financial, legal and healthcare sectors. Globo said that its GO!AppZone platform provides encryption for secure development, deployment and management of mobile apps, which meets federal security standards. The company asserted that it is the only ...

AWS avoids mass cloud reboot to fix Xen bug

servers in September, also due to a security bug in the hypervisor. "We've received a Xen ...

Spotlight: Proofpoint buys threat intelligence firm Emerging Threats for $40M

to provide threat intelligence for detecting, blocking and remediating cyberattacks. Read more ...

Firms lack security intelligence; Will Apple Pay make fraud easier?;

to hack routers (KrebsonSecurity) >> Signal 2.0 brings encrypted messaging to iPhone (Threatpost) ...

Attackers take advantage of theft victims to get iCloud login credentials

explained Symantec. iCloud security came under scrutiny last year following the theft of personal celebrity ...

IoT and big data a powerful combo, new studies find

and social factors that are driving more organizations to adopt I0T-enabled solutions," the report ...