Please turn on your JavaScript for this page to function normally.
Shylock’s new trick for evading malware researchers

Shylock is a financial malware platform discovered by Trusteer in 2011. Like most malware strains, Shylock continues to evolve in order to bypass new defensive technologies …

Mobile and cloud developments will dominate 2013

For the past several years, the IT industry’s transition to the 3rd Platform, built on mobile computing, cloud services, social networking, and big data analytics …

Metaforic releases software protection technology

Metaforic unveiled several new technology advancements that make it easier for software creators to protect a wide range of software (mobile, embedded, desktop, server) …

AVG releases Safe Browser for iOS, updates AntiVirus for Android

AVG updated its AntiVirus for Android and launched the new AVG Safe Browser for iOS. The main eye catcher in AVG AntiVirus for Android version 3.0.2 is the new user interface. …

Mobile communications hub with embedded encryption

API Technologies announced the new SST Secure Communications Hub (SCH) with integrated encryption. The SB1500ER Secure Communication Hub is a single, integrated device that …

Trend Micro cloud security optimized for Amazon Web Services

Amazon Web Services (AWS) customers are able to take advantage of optimized security solutions from Trend Micro for their AWS deployments, including the AWS Storage Gateway. …

Essential safe shopping tips

Based on Kaspersky Lab’s world-wide insight into malicious software and online scammers, the company offers the following 10 warnings and tips for online shoppers: …

Unencrypted payment data on business networks at 70%

SecurityMetrics published its second annual Payment Card Threat Report revealing unencrypted PAN (Primary Account Number) storage remains alarmingly high. Virtually no change …

Top 5 security threats for 2013

The Information Security Forum announced their forecast of the top five security threats businesses will face in 2013. Key threats include cyber security, supply chain …

Android security and optimization app

IObit released its Android security and optimization app – Advanced Mobile Care, designed for Android 2.2 and above. The app gives Android users a way to protect their …

Entrust solves SSL compliance challenges

Finding, managing and analyzing SSL and other digital certificates can be time-consuming, complex and expensive. To help automate and simplify these tasks, Entrust introduces …

Virtualization Security: Protecting Virtualized Environments

Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and …

Don't miss

Cybersecurity news