LATEST NEWS

Florida Supreme Court rules warrants a must for real-time cell location tracking

The Florida Supreme Court put the kibosh on warrantless real-time tracking using location data obtained from cell phone providers.

Modular malware for OS X includes backdoor, keylogger components

The modular malware was named "Ventir," by researchers at Kaspersky.

Hacker sentenced to 30 months in prison and $300k restitution

Lamar Taylor was sentenced in New Jersey this past week for allegedly participating in a cybercrime scheme that accounted for more than $15 million.

Apple OS X Yosemite contains bug fixes, Security Update also released

Apple OS X Yosemite includes fixes for more than 40 vulnerabilities, including POODLE and Shellshock.

Focus: Cyber Threats

Fake Dropbox login page nabs credentials, is hosted on Dropbox

Symantec researchers received a phishing email linking recipients to a fake Dropbox login page that is hosted on Dropbox's user content domain and served over SSL.

Product Reviews

Avatier Identity Management Suite

starstarstarstar½
Besides automating user creation, the Avatier suite of products offers seamless integration with HR software, enables IT departments to set up a web portal for users to reset their passwords, and it can also create workflows so that high-level IT personnel aren’t bogged down with lower-level requests.

Forum Systems Sentry API Gateway

starstarstarstarstar
The Forum Systems Sentry API Gateway is a comprehensive application security appliance that allows users to set up robust security over a variety of different protocols and data formats.

OPINIONS

Technology alone isn't going to secure IoT connected devices

Technology alone isn't going to secure IoT connected devices

It's clear that vulnerabilities continue to exist, despite our best efforts to combat them. In fact, we have addressed many of the same problems before.

Poll

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US