Please turn on your JavaScript for this page to function normally.
Facebook scammers exploit death of Steve Jobs

PandaLabs detected a malicious link on Facebook that was being used to exploit the news of the death of Apple co-founder Steve Jobs. Just a few hours after Steve Jobs’ …

The state of hacked accounts

Most users get hacked at high rates even when they do not think they are engaging in risky behavior, with 62% unaware of how their accounts had been compromised, according to …

Back to the future: Why IT managers should care about firewall management

A number of classic scenes in film and literature involved a group approaching a walled city or castle only to be stopped by a gatekeeper and asked, “Halt, who goes …

ExploitHub offers cash for exploits

ExploitHub, the marketplace for penetration testers, is issuing a bounty for exploits developed against 12 high-value vulnerabilities (CVEs). Security researchers who submit …

Malware attacks up due to social media

63 percent of more than 4,000 respondents in a new Ponemon Institute survey said that social media in the workplace represents a serious security risk — yet only 29 percent …

Verizon Business data breach investigations report 2011: 8 days a week

What can be learned from the investigation into successful data breaches? What are the latest trends and techniques used by attackers? Get a front row seat at the breach cases …

Oracle Public Cloud released

Oracle CEO Larry Ellison announced the Oracle Public Cloud, a set of integrated services that provide customers with subscription-based, self-service access to Oracle Fusion …

GFI VIPRE Antivirus Business 5.0 released

GFI Software launched GFI VIPRE Antivirus Business 5.0 and GFI VIPRE Business Premium 5.0, the latest evolutions of the company’s flagship antivirus solutions. GFI has …

Check Point stops bot attacks

Check Point announced a new Anti-Bot Software Blade that protects against bots and APTs (Advance Persistent Threats). Check Point helps customers discover bots and prevent …

Modular wireless switch for high-performance networks

Xirrus launched the XR-series Wireless Arrays, the first modular, chassis-based wireless switch portfolio – providing modularity to protect network investments as …

Secure data encryption tunneling for Apple iOS

WatchGuard unveiled their new security technology designed for Apple iOS-enabled devices. Mobile users often need to connect to corporate resources from high-risk locations, …

SpyEye Trojan hijacks mobile SMS security for online fraud

A stealth new attack carried out by the SpyEye Trojan circumvents mobile SMS security measures implemented by many banks. Using captured code, Trusteer discovered a two-step …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools