The following article by Kenneth Hess lists 10 BYOD policy guidelines that organizations can use as a starting point when managing security of users’ mobile devices connected to their networks... Read More
Guest blog post by Sameer Bhatia founder and CEO of ProProfs, a leading provider of online learning tools for building, testing, and applying knowledge... Read More
Security researchers from the Finnish consulting company Nixu, found a way how to get your files decrypted without paying the ransom resulting from a TorrentLocker infection... Read More
The original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix... Read More