Cisco Report–Email Attacks: This Time It’s Personal

In the complex and ever-changing landscape of online crime, cybercriminals have made a fundamental shift in strategy, abandoning traditional mass spam attacks in favor of personalized attacks with a greater financial impact on targeted organizations, according to
BeyondTrust Acquires Likewise Software Assets

BeyondTrust announced today the acquisition of Likewise Software’s Likewise Enterprise and Likewise Open products, expanding BeyondTrust’s portfolio to include authentication for cross-platform and cloud-based environments. Under the new PowerBroker Identity Services platform two products...
Survey Uncovers Risky Misperceptions on Security

G Data Software has
Weak PINs are the New Weak Password

What if your home or car lock used one of those simple, one-notch skeleton keys like you see for unlocking treasure chests in movies? It would offer pathetic protection that can be easily circumvented. That would be dumb. Why is it, then, that so many people do essentially the same thing when it...
RSA Offers to Replace SecurID Tokens…Finally

RSA Security probably hoped the issue of compromised SecurID tokens would just get swept under the rug and quietly disappear. No such luck.
Following recent
The USA Is Under Cyber Seige

It seems that a new Cold War is brewing, but instead of nuclear stockpiles or a Cuban missile crisis we have zero-day exploits and the RSA Security data breach. Whatever you...