Please turn on your JavaScript for this page to function normally.
Researchers uncover Tor-powered Skynet botnet

Rapid7 researchers have recently unearthed an unusual piece of malware that turned out to be crucial to the formation of an elusive botnet – dubbed Skynet by the …

Key trends in financial crime, risk and compliance for 2013

Investment in managing financial crime and compliance remains a high priority, with a significant uptick in planned expenditure for 2013, according to Detica NetReveal. Fraud …

Facebook helps Feds take down international cybercrime ring

The Department of Justice and the FBI announced the arrests of 10 individuals from Bosnia and Herzegovina, Croatia, Macedonia, New Zealand, Peru, the United Kingdom, and the …

Increasing cloud adoption puts enterprises at risk

Enterprises are running one-third of their mission-critical applications in the cloud today and expect to have half of all critical applications running in the cloud by 2015, …

Not all security devices are created equal

Independent test lab Broadband-Testing released a report on its performance validation of IT network firewall solutions from Cisco Systems, NetPilot, SonicWall and WatchGuard. …

Cyberwarfare and the developing digital arms race

According to security expert Mikko Hypp?¶nen, we might not be in a cyber war but we are in a cyber arms race, and the governments involved are the James Bond of the …

Six threats to watch out for in 2013

FortiGuard Labs revealed its 2013 threat predictions, highlighting six threats to watch out for next year. 1. APTs Target Individuals through mobile platforms APTs also known …

Free anti-spam software for the Mac

Cloudmark announced DesktopOne for Mac, that enables Mac users to filter email to eliminate messaging threats, protecting consumers and small businesses against spam, phishing …

The last Patch Tuesday of 2012

Today is the last Patch Tuesday of 2012. Its seven bulletins bring the total count for the year to 83, significantly down from last year’s 100 bulletins and even more …

Video: Smart TV 0-day vulnerability

This video by ReVuln demonstrates a 0-day vulnerability in Smart TV, in this case a Samsung TV LED 3D. Smart TV can be used to browse the Internet, use social networks, …

Smart grid ICS cyber security market to grow

Smart grid industrial control systems (ICS) remain in a state of flux. Security is still viewed as a cost-limitation exercise by many utilities, and advances toward meaningful …

McAfee mobile security app gets new privacy technology

McAfee released an enhanced version of McAfee Mobile Security featuring App Lock, an app privacy technology, as well as a completely refreshed user interface. The security …

Don't miss

Cybersecurity news