Please turn on your JavaScript for this page to function normally.
Hacker admits to selling access to company networks, supercomputers

A Pennsylvania man pleaded guilty today to charges stemming from his participation in a scheme to hack into computer networks and sell access to those networks. Andrew James …

Shielding targeted applications

When we discuss exploit prevention, we often talk about “targeted applications.’ This term refers to end-user applications which can be exploited by hackers for …

Kelihos botnet: What victims can expect

Kelihos is a botnet which utilizes P2P communication to maintain its CnC Network. With all of the attention around Kelihos, it should be no surprise that 30/45 AV vendors are …

The current state of application security

New research offers a better way to understand the maturity of an organization’s application security program in comparison to the core competencies of high-performing …

Compliance and security vulnerabilities are top concerns for POS systems

Without adequate controls to manage store systems and the increase in number and variety of devices – retailers can expect security costs to continue to increase …

Layer 7 updates mobile access gateway solution

Layer 7 Technologies announced updates to its SecureSpan Mobile Access Gateway, a middleware solution that simplifies enterprise application management. Among its new …

SSLI SDK for security solution providers

With an increasing level of Web traffic rapidly moving to the encrypted HTTPS protocol, Bloxx is now offering its Secure Sockets Layer Intercept (SSLI) Software Development …

Cloud emulation sandboxing service tackles zero-day attacks

Check Point has announced the availability of Check Point R77, the latest release for its Software Blade Architecture. R77 offers over 50 product enhancements, including the …

Social networks: Can robots violate user privacy?

High-Tech Bridge decided to conduct a simple technical experiment to verify how the 50 largest social networks, web services and free emails systems respect – or indeed …

AirWatch and Appthority partner for mobile app risk analysis

Appthority and AirWatch announced that AirWatch EMM is integrated with Appthority’s fully automated App Risk Management service for app analysis and risk management. The …

McAfee protects workloads on private and public clouds

McAfee announced a new version of its data center security solution that addresses enterprises’ growing need to leverage the scalability and cost savings of running …

Citrix releases NetScaler Control Center for VMware

Citrix announced Citrix NetScaler Control Center for VMware. Citrix is automating deployment and configuration of NetScaler functionality within networks that will use the new …

Don't miss

Cybersecurity news