Please turn on your JavaScript for this page to function normally.
Cybercriminals offer complex infection services

Services for fraudsters utilizing malware are not new – AV checkers, malware encryption and malware infection services have existed in the criminal underground market …

Cloud computing traffic to grow 12-fold by 2015

Cisco estimates global cloud computing traffic will grow 12-fold from 130 exabytes to reach a total of 1.6 zettabytes annually by 2015, a 66 percent compound annual growth …

Centralized management of Mac users

Centrify announced a new release of Centrify DirectControl for Mac OS X, a solution for Active Directory-based authentication, single sign-on, smartcard and group policy …

New release of WatchGuard XTM OS

WatchGuard Technologies unveiled their latest security operating system for the XTM line of unified threat management appliances. One of the new features includes the ability …

RIM to manage Android and iOS devices

RIM introduced BlackBerry Mobile Fusion, an enterprise mobility solution that will simplify the management of smartphones and tablets running BlackBerry, Android and iOS …

Cyber security trends for financial services in 2012

Booz Allen Hamilton today cited increased cyber threats to senior executives, the impact of organized crime and mobile device security as among the top 10 financial services …

NetWars to test the skills of infosec professionals

At SANS London 2011, Europe’s largest IT security training event, NetWars will be launched for the first time in the UK. NetWars participants compete in a mock …

Significant drop in FakeAV

The trend in malicious software and attempted cyber crime is up but some of the most popular and visible malware is trending down. According to lab results from Norman, a …

New mobile security challenges

For years, analysts have predicted most Internet users would end up with an all-in-one device that replaces all others. However, as new devices emerge, users are often …

Feds seize 150 domains for selling counterfeit goods

Seizure orders have been executed against 150 domain names of commercial websites engaged in the illegal sale and distribution of counterfeit goods and copyrighted works. The …

Schneider electric products multiple vulnerabilities

Multiple vulnerabilities have been reported in multiple Schneider Electric products, which can be exploited by malicious people to conduct cross-site scripting attacks, …

Twitter acquires Moxie Marlinspike’s startup

Well-known security researcher and speaker Moxie Marlinspike’s startup Whisper Systems has been acquired by Twitter. The official announcement says: The Whisper Systems …

Don't miss

Cybersecurity news