Corporate Partners

Top IT Security Bloggers

  • The Security Implications of Wearables, Part 1

    TrendLabs - Malware Blog
    The Internet of Everything has given rise to new gadget categories in every electronics retailer shop. Smart wearables are rapidly becoming more commonplace than you think. While not everyone has Google Glass, you can bet that a lot of people have fitness trackers and even smart watches. With ‘wearable devices,’ we mean those pieces of […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroThe Security Implications of Wearables, Part 1
  • The Security Implications of Wearables, Part 1

    Trend Micro - Security Intelligence
    The Internet of Everything has given rise to new gadget categories in every electronics retailer shop. Smart wearables are rapidly becoming more commonplace than you think. While not everyone has Google Glass, you can bet that a lot of people have fitness trackers and even smart watches. With ‘wearable devices,’ we mean those pieces of […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroThe Security Implications of Wearables, Part 1
  • SSCC 163 - So THAT'S why you can't erase Flash RAM properly [PODCAST]

    Sophos - Naked Security
    Here's this week's Sophos Security Chet Chat.

    Our regular security podcast that turns news into useful advice...
  • Now your LinkedIn account can be better protected than ever before

    Graham Cluley
    LinkedIn may not have a spotless record when it comes to security and privacy, but we should give them credit when they do something right.

    Learn more now in my article on the We Live Security blog.
  • Malware Bypasses Chrome Extension Security Feature

    Trend Micro - Security Intelligence
    Originally created to extend a browser’s functionality, browser extensions have become yet another tool for cybercriminals’ schemes. Earlier this year, Google has addressed the issue of malicious browser extensions by enforcing a policy that only allows installations if the extensions are hosted in the Chrome Web Store. While this policy can provide more security for […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroMalware Bypasses Chrome Extension Security Feature
  • Malware Bypasses Chrome Extension Security Feature

    TrendLabs - Malware Blog
    Originally created to extend a browser’s functionality, browser extensions have become yet another tool for cybercriminals’ schemes. Earlier this year, Google has addressed the issue of malicious browser extensions by enforcing a policy that only allows installations if the extensions are hosted in the Chrome Web Store. While this policy can provide more security for […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroMalware Bypasses Chrome Extension Security Feature
  • Fears grow of Home Depot data breach, exposing customers’ payment details

    Graham Cluley
    DIY retail chain Home Depot might be the latest big company to be hit by a serious data breach, after suspicions started to circulate that hackers had broken into its systems and manage to steal credit and debit card data.

    Read more in my article on the Lumension Optimal Security blog.
  • Fresh phish served with a helping of AES

    Symantec Security Response Blogs
    Summary: 


    Attempts to use encryption to make analysis of phishing websites more difficult may be a sign of things to come.



    Obfuscated phishing sites are nothing new. Various techniques such as JavaScript encryption tools (which offer very primitive obfuscation), data URIs (where the page content is mostly Base64-encoded), and character escaping are often used. However, recently we have seen a phishing site using the Advanced Encryption Standard (AES).
    read more
  • 5 things you should know about email unsubscribe links before you click

    Sophos - Naked Security
    We all get emails we don’t want and cleaning them up can be as easy as clicking 'unsubscribe' at the bottom of the email. However, some of those handy little links can cause more trouble than they solve.
  • Apple, please provide better protection for iCloud - Secure our Selfies!

    Sophos - Naked Security
    In the wake of exposed candid celebrity photos Apple recommends using two-step verification. Would this have made a difference? Should Apple strengthen its authentication options?

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place