LATEST NEWS

EPIC: driver data shared via V2V technology needs protection

The groups shared comments on V2V communications with the National Highway Traffic Safety Administration.

Researchers observe recently patched Adobe bug added to exploit kits

Researchers have indicated that a recently patched integer overflow in Adobe Flash Player has been added to exploit kits.

SEDNIT malware delivered in 'Operation Pawn Storm'

Military, governments and media from around the world are targets in a campaign identified by Trend Micro.

Malvertising impacts Yahoo, AOL visitors, spreads ransomware

The malvertising campaign is serving CryptoWall 2.0, researchers at Proofpoint revealed.

Focus: Mobile Security

Worm variant of Android ransomware, Koler, spreads via SMS

Upon infection, the Koler variant will send an SMS message to all contacts in the device's address book.

Product Reviews

Avatier Identity Management Suite

starstarstarstar½
Besides automating user creation, the Avatier suite of products offers seamless integration with HR software, enables IT departments to set up a web portal for users to reset their passwords, and it can also create workflows so that high-level IT personnel aren’t bogged down with lower-level requests.

Forum Systems Sentry API Gateway

starstarstarstarstar
The Forum Systems Sentry API Gateway is a comprehensive application security appliance that allows users to set up robust security over a variety of different protocols and data formats.

PFU Systems iNetSec Smart Finder

starstarstarstar½
The iNetSec Smart Finder from PFU systems is an excellent network access control system for organizations of any size.

OPINIONS

Technology alone isn't going to secure IoT connected devices

Technology alone isn't going to secure IoT connected devices

It's clear that vulnerabilities continue to exist, despite our best efforts to combat them. In fact, we have addressed many of the same problems before.

Poll

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US