eSecurityPlanet Staff Avatar
  • 5 Tips for Fighting Email Security Threats

    By Fred Touchette, AppRiver In today’s security landscape, email threats are one of the most common strategies utilized among cyber criminals. Much of the early spam traffic was annoying and essentially amounted to junk mail that consumed you and your company’s time. However, it wasn’t long before cyber criminals began using such messages to deliver […]

  • How to Build Security into Your Software Development Lifecycle

    By Nazar Tymoshyk, SoftServe In today’s technology environment, the question is no longer if your business is vulnerable to cyber security threats or may be attacked someday. The question is when, and will you be prepared. Widespread use of cloud computing, software-as-a-service (SaaS) and smart devices leave businesses of all types and scales more vulnerable […]

  • Mobile Device Management ROI Calculator

    Determining the return on investment for enterprise software is not always complicated. It’s fairly easy to determine the savings generated by using applications that remove time and/or manual steps from routine business processes. Calculating ROI for mobile device management solutions can be tricky, though, because MDM involves benefits that may not be easy to quantify. […]

  • Making a Case for Mobile Device Management

      Historically, the push for IT changes came from top-level executives and organizations provided employees with high-end computers that were well beyond the technology people had in their homes. Laptops are a great example of this – they entered the world in a top-down, calculated and directed fashion, which in turn put them under the […]

  • Heather Morris Hacked

    Nude photos of “Glee” star Heather Morris were recently posted online. “The naked pictures are alleged to have been stolen by hackers from the 25-year-old actress’s mobile phone,” writes Sophos’ Graham Cluley. “In November 2011, Christopher Chaney of Florida pleaded not guilty to hacking into the email and cellphones of some 50 people, including Scarlett […]

  • Digital Playground Porn Site Hacked

    The porn site Digital Playground was recently hacked by The Consortium, exposing 72,794 customers’ user names, e-mail addresses and passwords, as well as more than 44,000 credit card numbers. “They did not dump the 44,663 credit card numbers that they claim to have acquired, but note that card numbers, card expiration date, cvv and all […]

  • Buy a Botnet: THOR for Sale for $8,000

    A new botnet coded by TheGrimReap3r is currently nearing completion, and will soon be offered for sale on hacking forums for $8,000. “THOR does not use a central [command and control server],” Infosecurity reports. “It has a decentralized architecture based on peer-to-peer (P2P) technology. P2P botnets are the latest innovation in the battle between whitehat […]

  • Passware Cracks Apple’s FileVault Encryption

    Computer forensics firm Passware has released software capable of circumventing Apple’s FileVault disk encryption in under an hour. “Technology from Passware is reportedly capable of capturing the content of a Mac machine’s memory, via Firewire interfaces, before extracting encryption keys,” writes The Register’s John Leyden. “Passware’s software previously included the ability to extract Mac passwords […]

  • Amazon Silk Browser Hacked

    Hackers have successfully deployed the Kindle Fire’s Silk browser on other Android devices. “The hack requires a rooted device, and some mucking about with apk files, but does share the Silk love,” writes The Register’s Bill Ray. “XDA-Developers member TyHi initially hacked the Silk browser into the popular CyanogenMod Android distribution, but others have tested […]

  • Accuvant Study Finds Chrome is Most Secure Browser

    A study [PDF file] conducted by Accuvant on behalf of Google has determined that Google Chrome is the most secure browser, thanks to its sandboxing tech. “The evaluation was based on the premise that anti-exploitation technology, such as sandboxing, reduces the vulnerability of a browser to a single exploit or an entire class of exploits,” […]

Top Cybersecurity Companies

Top 10 Cybersecurity Companies

See full list

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis