Please turn on your JavaScript for this page to function normally.
SCADA systems flaws exploited to open prison doors

The discovery of the Stuxnet worm has alerted governments around the world about the possibility of industrial control systems being targeted by hackers and has made a lot of …

Fedora 16: Cloud and virtualization features

The Fedora Project announced the availability of Fedora 16, the latest version of its free open source operating system distribution. Notable feature enhancements include: …

iOS flaw allows App Store apps download malicious code

Since the App Store’s inception, Apple has been carefully examining applications submitted by third-party developers in order to assure its customers a malware-free …

One in nine Internet users surfing without protection

The number of new malware strains continues to rise. G Data Security Labs counted over 1.2 million new computer malware strains in the first half of the year alone. Despite …

Framework for analyzing web-based threats

Wepawet is a framework for the analysis of web-based threats. It uses a composition of tools and techniques to execute, trace, analyze, and characterize the activity of code …

Access Windows using your iPad and iPhone

Leostream Connect enables users to access secure and reliable Windows desktops and applications directly from their iOS device. This application allows an increasingly mobile …

Why do malicious Android apps come from China?

It seems like every time we hear about a malicious application aimed at Android users, it is always distributed by third-party Chinese app markets. You might wonder why the …

McAfee updates its Cloud Security Platform

McAfee announced the latest enhancements to its Cloud Security Platform which secures all primary channels of traffic – email, web and authentication – moving …

Barracuda Link Balancer XSS vulnerabilities

Two vulnerabilities have been reported in Barracuda Link Balancer, which can be exploited by malicious people to conduct cross-site scripting attacks, according to Secunia. …

Mobile screen-spy software recreates passwords

When one types text messages, emails and login credentials on one’s virtual iPhone or Android keyboard, larger bubbles containing each character pop up for a second …

New analytics advance IBM security intelligence portfolio

IBM is extending its proven security services portfolio to include enhanced analytic tools and services to provide deeper, real-time analysis of advance threats. By detecting …

IT Operations Analyzer gets expanded monitoring capabilities

Hitachi announced a new version of its IT Operations Analyzer, an integrated availability and performance monitoring tool that can help reduce complexity, streamline …

Don't miss

Cybersecurity news