A recent study from HP and the Ponemon Institute surveyed more than 5,500 IT professionals, from operations to security management, to gauge potential problems with...
Hi, what are you looking for?
A recent study from HP and the Ponemon Institute surveyed more than 5,500 IT professionals, from operations to security management, to gauge potential problems with...
NT OBJECTives, an application security vendor based in Irvine, California, has released a new tool that not only scans for SQL Injection vulnerabilities, but...
ENSIA Identifies 16 Areas Where CERTS Fail on Proactive Detection of Network Security Incidents In a report detailing the findings of a study on...
ENISA and OWASP Issue Smartphone Secure Development GuidelinesThe European Network and information Security Agency (ENISA) and OWASP have published a report for secure development...
OpenDNS has released a tool along with its source code, that enables encrypted DNS traffic, much in the same way SSL enables encrypted HTTP...
Carrier IQ remains in the spotlight this week, as conflicting reports over the software and its usage have sparked lawsuits, additional research, and even...
What does Jailbreaking Mean for the State of Consumer Device Security?
Websites reporting on electoral violations suffered a sustained outage on Sunday, which started from the time the polls opened, and ended with the election’s...
Large Banks Targeted in #OpRobinHood as Hacktivists Look to Steal from the Rich and Give to the Poor
The Philippines Criminal Investigation and Detection Group (CIDG) said on Saturday that with the help of the FBI, four people have been arrested and...
The Minister for the Cabinet Office and Paymaster General, Francis Maude, published a set of plans on Friday outlining the UK’s goals over the...
In a letter sent to customers on Friday, and obtained by SecurityWeek, NASDAQ outlined measures put in place to secure its Directors Desk platform,...