Security giant Symantec on Tuesday acquired Nukona, a privately held provider of mobile application management solutions, for an undisclosed amount.
DLP solutions remain fairly immature, but the need to protect and monitor sensitive information is greater than ever.
Developers can now turn to third-party platforms to meet their credential management needs, says Michael Ginsberg, CEO, Echoworx.
Organizations should consider risk when fixing vulnerabilities, especially considering most bugs are present in third-party applications.
A computer disk containing the personal information of thousands of medical aid applications has gone missing from the Colorado Department of Health Care Policy and Financing.
The personal information of thousands of current and former California state employees was improperly copied to a hard drive and removed from state offices.
The sky is not really falling. Instead, there are solutions to the dilemmas we face, even as progress makes surety ever more challenging.
Microsoft on Monday released an emergency fix for a Windows vulnerability that is being exploited to launch attacks against industrial control systems.
The first publicly known zero-day vulnerability to affect Windows XP Service Pack (SP) 2 since Microsoft earlier this month ended support for the platform is being leveraged to execute malware designed to steal sensitive data from critical infrastructure providers.
McAfee announced Tuesday that it has acquired Trust Digital, maker of enterprise mobility management and security software for large enterprises. The deal, terms of which were not disclosed, will allow McAfee to expand its endpoint portfolio to offer solutions to deploy, manage and secure smartphones running on platforms such as the iPhone, Android, Windows Mobile, Palm webOS and Symbian operating systems. In addition, Trust Digital's offerings will be integrated with the McAfee ePolicy Orchestrator console to offer centralized management and reporting of mobile devices. — DK
A private equity firm on Tuesday purchased a majority interest of Sophos, which recently dropped plans to IPO, for $830 million.
The nonprofit Trusted Computing Group is offering a new standard for managing clientless devices, a specification that can help organizations avoid gaps in network security.
Deploying an effective endpoint security strategy is essential in a business environment with growing numbers of telecommuters.
A new ransomware variant encrypts files on a computer, but uses a novel twist on monetizing the extortion threat.
President Obama's cybersecurity speech was the most notable information security event from the second quarter of 2009, security vendor F-secure said in its quarterly threat summary. The most notable threats from March to June included the Conficker worm, Twitter attacks, and PDF exploits. Conficker, in particular, "proved to be the most significant malware outbreak in recent years," F-Secure said. — AM
Never mind optimizing search result rankings, malicious attackers now are trying to optimize their tweets.
Sign up to our newsletters
SC Magazine Articles
- 'Sexy Girls' wallpaper app in Google Play store accessed account info
- Zeus variant targeting Canadian banks, U.S. banks may also be a target
- New attack uses ransomware to drop trojans and keyloggers
- 'GHOST' bug in Linux library enables remote takeover of victim's system
- Firm finds link between Regin spy tool and QWERTY keylogger
- Report: From Q3 to Q4, 90 percent increase in global DDoS attacks observed
- Researchers observe databases being encrypted, websites held for ransom
- ZeroAccess botnet reactivates, click fraud activity resumes
- BCBS of Tennessee shares personal data on 80K in marketing campaign
- Tips for organizations in the wake of the biggest corporate hack in history