Please turn on your JavaScript for this page to function normally.
The mobile cybercrime landscape is becoming more defined

McAfee found that Android-based malware achieved a 35 percent growth rate not seen since early 2012. This rebound was marked by the continued proliferation of SMS-stealing …

Rapid7 unveils analytics for security controls and user risk

Rapid7 showcased two new IT security insight solutions at the UNITED 2013 security summit. Lee Weiner, senior vice president of products and engineering at Rapid7 comments: …

Veeam Backup & Replication 7 released

Veeam Software announced Veeam Backup & Replication 7, which introduces built-in WAN acceleration and backup from storage snapshots. Built-in WAN acceleration copies data …

MitB malware targets steam

When cybercriminals use Man-in-the-Browser (MitB) malware to commit online fraud, financial institutions are not their only targets. Dating, eCommerce, hospitality, and travel …

Nmap 6.40 released

Nmap is a free and open source utility for network exploration or security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the …

Why continuous IT cost optimization is essential

After years of tactical cost-cutting, many organizations now face the challenge of continuous IT cost optimization after the realization that optimization practices are never …

EVault backup appliances now with cloud-connected software for failproof recovery

EVault announced a new portfolio of EVault backup appliances, expanding its enterprise-grade appliances to accommodate the backup and recovery needs of any organization …

ENISA analyzes major security incidents in the EU

The European Union Agency for Network and Information Security (ENISA) today issued a new report providing an overview of the major outage incidents in the EU in 2012. The …

Scanning the Internet in less than an hour

Scanning the Internet used to be a task that took months, but a new tool created by a team of researchers from the University of Michigan can scan all (or most) of the …

Advanced threats to drive growth in new product segment

As hackers have shifted their ultimate goals from disruption and notoriety to financial and intellectual property theft, the tactics they use have changed accordingly. The …

Lucrative business: cybercrime-as-a-service

With news of the struggling high street becoming a regular occurrence, it is not surprising that increasingly small businesses are seeking opportunities online. However …

Manage security across multiple systems with Milan 3.0

Prosperoware Milan 3.0, an integrated platform for information governance, now includes a new module that helps firms move to a “need-to-know” security model. …

Don't miss

Cybersecurity news