CipherCloud have created another brilliant infographic that shows just how important encryption really is
Browsing: Malware and Vulnerabilities
With the increased adoption of bug bounty programs by companies such as Facebook, Google, and Etsy, it’s no wonder bug bounty security startup Bugcrowd
For network engineers the greatest stress is all the new technology that members of staff bring in to connect to the company’s network in January
Panda Security has incorporated its popular Panda Cloud Cleaner malware detection and disinfection tool into Panda Cloud Systems Management
Last week High-Tech Bridge’s Security Research Team was preparing our web vulnerabilities statistics report for 2013
The Veteran Affairs E-Benefits website was shut down temporarily last week after VA security employees detected a data breach in the site’s code.
On 8th April 2014 Microsoft will end mainstream support for Windows XP. With over 20% of Windows PCs still running XP this is a significant event.
A new research report issued by Bloxx has found that 68% of the UK’s education organisations are facing an ongoing battle with anonymous proxies.
Other red-flag warning signs that helped me spot these as a fakes:
2014 provides us with the opportunity to practice safe hex (thank you @BrianHonan for that!)