Please turn on your JavaScript for this page to function normally.
ICSA Labs tests products against larger malware set

ICSA Labs, an independent division of Verizon, is now testing products in its Anti-Virus program against virus samples from not only the WildList (a database of real-world …

How does GFI LanGuard help network administrators?

Managing an IT network that is continuously changing and growing is not a trivial task. Once the network comprises more than a handful of machines, it becomes a …

Week in review: U.S. government satellites hacked, Halloween threats and the m00p gang investigation

Here’s an overview of some of last week’s most interesting new, podcasts and articles: Microsoft puts vulnerability exploitation into context Recently Microsoft …

Duqu not developed by Stuxnet author

The Dell SecureWorks Counter Threat Unit (CTU) research team has been analyzing the Duqu trojan which received a great deal of attention because it is similar to the infamous …

Combating Halloween malware threats

GFI Software released tips for spotting and combating malware attacks and threats in the run up to Halloween. Halloween has now become firmly established as a family event in …

Endpoint Protector 4 released

CoSoSys released a new version of their flagship device control and data loss prevention solution, Endpoint Protector. Offering enhanced protection, increased effectiveness …

National-scale iris and fingerprint identification

Neurotechnology announced MegaMatcher Accelerator 4.0, the latest update of the company’s multi-biometric software and hardware solution for high-volume, high-speed …

Android malware is stealing your data

The second half of 2011 has been an active one for cyber criminals, who have been increasingly looking for chances to set up new scams in the mobile device environment. …

Websense introduces URL categories and social web controls

Websense introduced URL categories and social web controls that enable IT managers to better regulate specific employee actions, reduce exposure to dangerous data-stealing …

Cisco WebEx Player WRF file processing vulnerabilities

Multiple buffer overflow vulnerabilities exist in the Cisco WebEx Recording Format (WRF) player. In some cases, exploitation of the vulnerabilities could allow a remote …

Data breaches cause lasting reputation damage

Reports of data breaches affecting some of today’s largest companies continue to grab the headlines of prominent news outlets nationwide. The damage experienced by a …

Replacement for legacy two-factor authentication

Yubico announced the availability of YubiRADIUS, a free, virtual appliance server that delivers secure remote access, SSL-VPN and VPN connectivity. Built on open source …

Don't miss

Cybersecurity news