Please turn on your JavaScript for this page to function normally.
Modeling, customizing, and automating applications with AWS OpsWorks

Amazon Web Services launched AWS OpsWorks, an application management solution for the complete lifecycle of complex applications, including resource provisioning, …

Virtual appliance fuels Bring Your Own Identity

NetIQ announced SocialAccess, a virtual appliance that allows business and government entities to leverage social identity providers to share select identity information for …

Antibot: Network-based botnet removal tool

Botnets are flourishing with new packaging, new methods and new business models. ZeroAccess, the world’s fastest-growing botnet, infected millions of computers in 2012, …

Week in review: Bit9 hack, malicious applications of augmented reality, and Adobe 0-day mitigation

Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: Bit9 hacked, its certificates stolen and used to sign malware Bit9, …

Most Americans think cyber warfare is imminent

A national survey of Americans shows a majority fear that cyber warfare is imminent and that the country will attack or be attacked in the next decade. Despite the threat, …

Mobile network infections increase by 67%

Kindsight released a new report that reveals security threats to home and mobile networks, including a small decline in home network infections and an increase in mobile …

Successful ways of undermining cybercrime ecosystems

Most cybercrime is carried out by a loose confederation of independent contractors who work together when necessary through online forums and “partnerkas” that …

Video: Pirate Party MEP talks online child safety

Children and teenagers benefit hugely from being online, but they can also be targets of crime and exploitation as in any other environment. Child safety online is listed as …

Symantec unveils new SSL algorithms and web security products

Symantec unveiled new updates to its Website Security Solutions portfolio with capabilities to meet the increasing security and performance needs for connected businesses. The …

Cloud computing in critical information infrastructure protection

ENISA has launched a new report looking at cloud computing from a Critical Information Infrastructure Protection (CIIP) perspective, and identifying that cloud computing is …

Phishing campaigns run rampant on social networks

In January, GFI threat researchers identified a number of social network-based cybercrime attacks, including phishing messages on Twitter and Facebook, as well as malicious …

11 arrested in takedown of prolific ransomware gang

The Spanish Police, working closely with the European Cybercrime Centre (EC3) at Europol, have dismantled the largest and most complex cybercrime network dedicated to …

Don't miss

Cybersecurity news