Security News
![Top 10 Discussions from the First Week of May! (IT Toolbox Blogs)](/static/build/img/news/alt/antivirus-stats-small.jpg)
![Why is it so hard for HTC to make a quality smartphone camera? (Yahoo Security)](/static/build/img/news/alt/Data-Cybersecurity-Predictions-2-small.jpg)
![Tor Cloud project reaches the end of the line (Help Net Security)](/static/build/img/news/alt/breach-statistics-small.jpg)
2015-05-11 14:08
The Tor Project has discontinued the Tor Cloud project due to a lack of dedicated software developers and maintainers. The Tor Cloud project was started in late 2011, with the aim to provide a user...
![Do you know where your sensitive data lives? (Help Net Security)](/static/build/img/news/alt/Data-Cybersecurity-Predictions-2-small.jpg)
2015-05-11 13:28
The majority of IT security professionals don’t have full visibility into where all their organization’s sensitive data resides, according to Perspecsys. Challenges with tracking where sensitive ...
![A New Role in IT - The Mobile Strategist (SecurityWeek)](/static/build/img/news/alt/application-stats-small.jpg)
![Adobe to patch critical Acrobat, Reader security flaws (ZDNet)](/static/build/img/news/alt/hackers-statistics-small.jpg)
![Tor Cloud Project closes its doors (ZDNet)](/static/build/img/news/alt/cloud-cybersecurity-statistics-small.jpg)
![Sysdig - An interesting new tool for system exploration! (Reddit)](/static/build/img/news/alt/DDoS-small.jpg)
![Angler exploit kit using tricks to avoid referrer chain leading back to malvertisement provider (Reddit)](/static/build/img/news/alt/IoT-Cybersecurity-Predictions-2-small.jpg)
![Russia and China seal cyber non-hack pact (The Register)](/static/build/img/news/alt/cybersecurity-attacker-small.jpg)