Please turn on your JavaScript for this page to function normally.
Week in review: Android spam-spreading botnet, highest profile software failures of 2012, and data center design innovations

Here’s an overview of some of last week’s most interesting news, interviews and articles: Improving information security with one simple question Anyone who has …

Mobile malware, botnets and attacks on the cloud to rise

ESET has published its annual review of the past year’s threat trends and compiled predictions for 2013. According to the new report, the 2013 threatscape will see major …

Ten tips for mobile security

Mobile devices have become increasingly common and the markets are flooded with new applications for business and entertainment. People are using mobile devices to play games, …

Vulnerabilities in Java and Adobe to become main targets for cybercriminals

Software vulnerabilities will be the main target of cyber-criminals next year, according to a list of security trends that will dominate in 2013 by PandaLabs. “It is …

Guidance on cybersecurity, private clouds and privacy

ISACA today issued guidance on managing three top trends posing major challenges to businesses in 2013: cybersecurity threats, private vs. public clouds and data privacy. …

Sudoku puzzle generating spreadsheet carries malware

Sudoku lovers, beware! Your love for solving the popular puzzle could just be the right entrance point cyber criminals need to saddle you with information-stealing malware. …

Lancope releases new threat intelligence for detecting attacks

Lancope released new threat intelligence for monitoring global cyber attacks. Through its StealthWatch Labs Intelligence Center (SLIC), Lancope is now delivering two new …

WatchGuard enhances XCS security appliances

WatchGuard Technologies announced the availability of its enhanced Extensible Content Security (XCS) solutions for SMBs. The XCS 580 and XCS 280 provide the same trusted …

Forensic access to encrypted BitLocker, PGP and TrueCrypt containers

ElcomSoft released Elcomsoft Forensic Disk Decryptor, a forensic tool providing access to information stored in disks and volumes encrypted with BitLocker, PGP and TrueCrypt. …

Online reputation management tips

AVG announces twelve tips for individuals to safeguard their reputations while engaging in heightened e-commerce and social media activities during the holidays. …

Cloud exploits and mobile device attacks on the horizon

Although many security experts predict that the most likely data breach threats organizations will face in 2013 include cloud exploits, mobile device attacks and all-out cyber …

Exploits, security threats and hacks will mutate in 2013

Lamar Bailey, Director of Security Research and Development with nCircle, has released his top five security threats to watch out for in 2013. The New Year – and beyond …

Don't miss

Cybersecurity news