Fujitsu eyeing palm scanners for smart phones

Japanese technology company Fujitsu Ltd. hopes to install palm scanners in smart phones as a means of user authentication. The...

March 3rd, 2014 Nestor E. Arellano

RSA conference: How the cloud can improve security

SAN FRANCISCO - After the warnings about the cloud and its potential threats to security, it seems counter-intuitive to say...

February 28th, 2014 Candice So

Cloud Security,

RSA conference: 10 security concerns for the public cloud

SAN FRANCISCO - It’s not news that businesses are moving more  of their data to the cloud. But even as...

February 28th, 2014 Candice So

RSA conference: One shared threat database in security’s future

SAN FRANCISCO – With daily headlines about new malware, dangerous threats, and unforeseen attack vectors, it might be easy to...

February 27th, 2014 Candice So

Apple says fix for Mac encryption flaw coming soon

Following the release of a fix for a major security flaw in its iPhone and iPad mobile devices Apple Inc.,...

February 24th, 2014 Nestor E. Arellano

Unnecessary admin accounts behind malware risks

By being more discriminate in doling out administrator accounts, chief security officers (CSO) can significantly lower the risk of their...

February 20th, 2014 Nestor E. Arellano

Why a security blogger is a target

It used to be that newspaper reporters dreamed of becoming freelance writers in somewhere exotic -- say, Paris, London, Hong...

February 17th, 2014 Howard Solomon

It’s a short line from hacktivism to terrorism, says Eugene Kaspersky

PUNTA CANA, Dominican Republic – There are a lot of threats in the cyberworld but one that concerns Eugene Kaspersky the...

February 12th, 2014 Jeff Jedras

Adobe hack might be worse than thought: Report

Dent is made in international email password hacking rings

There is a glimmer of light for those who think there’s nothing but darkness ahead for network security. According to...

January 27th, 2014 Howard Solomon