Archive

Back to homepage
Mobile

Assessing the Top Mobile Security Trends of 2015

Mobile has become the new normal, and mobile devices are increasingly the preferred way of connecting to resources and services. Without doubt, this trend will continue. New global research from

Software

The password can be replaced by pictures, researchers say

Researchers from the University of Plymouth are suggesting we ditch the traditional password and replace it with something much more fitting for 2016. They’re suggesting a system themselves developed, called

Software

Microsoft to warn users of hacking by govts

Microsoft said it will begin warning users when the company suspects that a government has been trying to hack into their accounts. Read the source article at cnbc.com

Software

Adobe Flash gets the final security patch of 2015

There’s nothing quite like kicking a dead corpse, and that’s basically what Adobe is doing with its once powerful product Flash. Adobe has issued a security update for Flash, one

Industry Insights

The bad security habits enterprise IT needs to leave behind in 2016

2015 has played host to some significant cyber breaches. Experian, TalkTalk and Ashley Madison all fell foul of malicious attacks, and they weren’t the only ones. In 2016, businesses need

Software

Rise in Malware Sending Network Advanced Threat Protection Market to $1.3B in 2019 – Infonetics

Global content security gateway appliance and software revenue totaled $856 million in the third quarter of this year, according to market research firm, Infonetics. Unchanged from last quarter, 65 percent of the

Cloud

Cloud, Data Security Remain Top Concerns Heading Into 2016 | HDM Top Stories

Data analytics and business intelligence remain the top concern of most IT leaders heading into 2016 according to some recent studies, and that is placing greater attention on cloud computing

Mobile

Information Warfare: Tough Smart Phones For The Infantry

Since 2012 the U.S. Army has been looking for cell phones rugged enough and with features that make it suitable for military use in a combat zone. These combat smart

Software

AVG’s Web TuneUp put millions of Chrome users at risk – BBC News

It has emerged that a popular tool meant to ward off malware contained a flaw that put millions of people’s personal data at risk. AVG’s Web TuneUp software is marketed

Software

ProxyBack Malware Converts Your PC Into Proxy

As per Palo Alto researchers, a Russian company’s domain is being used by attackers, which inherently is a patent Web proxy service. The malware has been named ProxyBack and it