Please turn on your JavaScript for this page to function normally.
Serious jump in new vulnerabilities exploitation

On a typical month, exploit activity falls between 30 percent and 40 percent, according to Fortinet. Half of new vulnerabilities rated as “critical” were targeted …

Panda Antivirus for Mac Corporate Edition released

Panda Security launched Antivirus for Mac Corporate Edition, a solution for companies operating with hybrid computing environments, delivering complete protection against all …

63.7% of organisations plan a cloud investment this year

Only 36.3% of organizations are not planning any cloud investment, suggesting that previous fears of moving into the cloud may have abated, according to Ipswitch. Cloud …

Cisco unveils security specialist training and certifications

Cisco introduced new Security Specialist certifications to recognize individuals who have attained specific competencies critical to meeting demand for network security skills …

VLC 1.1.7 fixes security issue

VideoLAN unveiled VLC 1.1.7, a security update on 1.1.6. When parsing an invalid MKV (Matroska or WebM) file, input validation are insufficient. If successful, a malicious …

IT governance and mobile technology

The mobile world is undergoing explosive growth. Luckily, enterprises are beginning to realize the potential gains and losses this technology offers, enabling them to act …

Cain & Abel 4.9.38 released

Cain & Abel is a password recovery tool for Microsoft operating systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted …

Expanding phishing vector: Classified ads

The online classified advertisement services sector has been increasingly exploited as a phishing attack vector by ecrime gangs, a trend confirmed by the growth of attacks …

Free guide: Web application security

Vulnerabilities in web applications are now the largest vector of enterprise security attacks. Stories about exploits that compromise sensitive data frequently mention …

Widespread “undelivered package” spam attack delivers Trojans

Cybercriminals are currently sending out the spam messages – which come attached with a malware infected .zip file – with titles such as “Post Express …

Governance has a central role in IT security

A major survey from ISACA confirms the central role that governance plays in information security within large organizations and stresses the fact that 95% of IT professionals …

SecureSurf: Malware protection and web filtering

AppRiver introduced SecureSurf, a Web protection solution that provides defense against online threats. SecureSurf is an easy-to-deploy hosted solution that protects companies …

Don't miss

Cybersecurity news