Security News

2015-06-03 06:54
Handing control of sensitive data to a third-party cloud service provider remains one of the biggest data compliance challenges today. Top executives from Perspecsys are on hand at Infosecurity Europ...








2015-05-26 14:46
There is a vulnerability in some versions of Synology’s Cloud Station client for OS X that can enable any user to take over system files and gain complete control of the machine. Cloud Station is...
