This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

MORE NEWS

Dual-pronged social media attack vector discovered

Symantec researchers have spotted a dual-pronged social media engineering attack.

Major Twitter spam attack 'traced' to fellow social media site

Photo-sharing website We Heart may have been hit by a stream hack, after it was cited as the source for thousands of spam messages being sent out on Twitter.

Cybercriminals use online gaming sites to funnel fraudulent revenues

A new report from McAfee details how cyber-criminals are increasingly using online gaming and gambling sites to launder money.

PRODUCT REVIEWS

Fortinet FortiGate140DPOE

starstarstarstarstar
The FortiGate-140D-POE from Fortinet offers a built-in firewall, intrusion prevention system, application control, web and email filtering and anti-virus in one solid appliance.

SecPoint Protector P800

starstarstarstarstar
The Protector UTM appliance from SecPoint offers a full set of features packed into a single device.

VASCO aXsGUARD Gatekeeper

starstarstarstar¾
This product provides a complete secure remote access platform that incorporates many perimeter security functions.

Opinions

Winning strategies in cyber warfare

Winning strategies in cyber warfare

The adversary has enormous capabilities in the cyber world, but it too is not without its vulnerabilities, and these must be exploited says Calum MacLeod.

Getting to the heart of the problem

Getting to the heart of the problem

As the Heartbleed bug demonstrates, passwords - especially the way they are commonly used across sites - are inherently vulnerable suggests Chris Russell

Changing the cost of cybercrime

Changing the cost of cybercrime

Oganisations need to cooperate and share threat intelligence in order to increase the cost of cyber attacks for hackers suggests Russ Spitler, VP product management, AlienVault

In Focus

Newsletters