Posted on 21 October 2014. | Spotlight can now also be used to make searches on the Internet, and it sends the users' search queries and information about their physical location to Apple.
Posted on 20 October 2014. | China-based Internet users are in danger of getting their iCloud and Windows Live accounts hijacked.
Posted on 17 October 2014. | US-CERT released an advisory warning users about email scams and cyber campaigns using the Ebola virus disease as a theme.
Posted on 16 October 2014. | Admins of sites that run Drupal 7 are advised to update to the latest version of the platform because it fixes a critical vulnerability.
Posted on 15 October 2014. | Lynis unearths vulnerabilities, configuration errors, and provides tips for system hardening.
Posted on 21 October 2014. | Multiple banks say they have identified a pattern of credit and debit card fraud suggesting that several Staples Inc. office supply locations in the Northeastern United States are currently dealing with a data breach.
Posted on 20 October 2014. | The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has recognized how critical the state of software security is to the DHS mission.
Posted on 15 October 2014. | Lynis unearths vulnerabilities, configuration errors, and provides tips for system hardening. It is written in shell script, installation is not required and can be performed with a privileged or non-privileged account.
Posted on 14 October 2014. | Enabling employees and contractors to bring their own devices to work has become a way of life for many organizations. Many understand that traditional perimeter security defenses are not effective at identifying attacks on mobile devices.
Posted on 13 October 2104. | Designed for IT and security professionals, the service gives a view of the data exchanged with partner and cloud applications beyond the network firewall. Completely passive, it runs on non-production systems, and does not require firewall changes.