According to a survey conducted in December and released recently by Sungard, IT professionals believe their organizations aren’t doing enough…
Security Blog
The Federal Trade Commission (FTC) released yesterday the top 10 scams for 2014. These scams are considered a form of…
Cisco has identified a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service condition. The…
February 24, 2015 According to the United States Computer Emergency Readiness Team, Linux and Unix based operating systems employing Samba…
Original release date: February 20, 2015 Lenovo consumer personal computers employing the pre-installed Superfish Visual Discovery software contain a critical…
According to Forbes Magazine, More than two million vehicles may be at risk thanks to insecure firmware in Progressive Insurance’s…
Outgoing Oklahoma U.S. Senator Tom Coburn (R) says that the Department of Homeland Security (DHS) has failed at safeguarding and…
President Obama is putting forward a legislative proposal that would enable cybersecurity information sharing in the private sector and between the private…
Picking up the pieces after the fallout of the Sony Breach. Take it from Sony, all companies and their executive…
Last week, the Department of Veterans Affairs announced that a security lapse in the network of an undisclosed telehealth services…