While data breaches by hackers get headlines, another form of data leakage can be very damaging to a company’s bottom …


While data breaches by hackers get headlines, another form of data leakage can be very damaging to a company’s bottom …

The biggest business challenge today, in the minds of many information security officers, is the stealthy online infiltration by attackers …

IT security and data protection firm Sophos has published its Mid-Year 2011 Security Threat Report. The report reveals that fake …

A new Android Trojan is capable of recording phone conversations, according to a CA security researcher. While a previous Trojan …

IT security vendor ESET Middle East has announced a special offer for organisations looking to secure their networks in the …

As personal and professional lives become more intertwined, employees are using their own consumer-grade tablets, smartphones and PCs for work …

In a recent IDC International Survey on security governance, risk, and compliance, IDC Energy Insights found that over 50% of …

Cybercrooks are increasingly capitalising on the mass adoption of mobile devices by exploiting smartphone users, at home or at work. …

The in-house reputation system used in Internet Explorer 8 and 9 is markedly superior at blocking social-engineering attacks than the …

Setting the stage for cloud deployments, VMware will update many of its core products and bundle them into an integrated …

Dubai Courts continues to invest in and grow its online presence as it works to expand and improve the services …

The Twitter account for Fox News was apparently hacked, with six tweets falsely reporting early yesterday morning that U.S. President …

Trend Micro has announced the public beta release of Trend Micro Titanium Maximum Security 2012. Customers who download the 2012 …

The latest independent Canalys study of worldwide enterprise security market share found that Trend Micro is the world’s fastest -growing …

Faced with increasing competition and a fast paced global environment organisations are making investments in strategic IT investments that enable …

At this year’s EMC World, the IT giant integrated its strengths in storage and the cloud to present solutions that …

Trend Micro has announced that Trend Micro Deep Security software is now validated in the HP Cloud Operating Environment (CLOE), …

Apple this week called Amazon’s Appstore for Android “inferior” as it urged a federal court to block the online retailer …

IT security and control firm Sophos is warning people to be vigilant, following the discovery of an advanced ‘scareware’ campaign …

Google has disrupted what it believes to be a targeted phishing campaign aimed at stealing e-mail from government officials, contractors …