- Most USB thumb drives can be reprogrammed to silently infect computers
- Attackers exploit remote access tools to compromise retail systems
- US judge rules against Microsoft in email privacy case
- Twitter reports a rise in government data requests
- Tor points finger at US researchers after possible compromise of service
In Pictures: 12 hybrid Cloud security products to watch
Here are 12 security products that you can buy for your hybrid cloud whether they run on premise, in the cloud or a little of both.