Please turn on your JavaScript for this page to function normally.
Patching strategies

Cybercriminals have initiated an arms race by refining the malware manufacturing and development process to systematically bypass defense mechanisms. There are many …

Anti-theft protection for Android and Windows devices

Norton Anti-Theft is a new Web-service that allows consumers to remotely lock, locate and recover a lost or stolen Windows based laptop, or Android smartphone or tablet. The …

Critical vulnerabilities in Adobe Photoshop Elements 8

Critical vulnerabilities exist in Adobe Photoshop Elements 8.0 and earlier versions. These two buffer overflow vulnerabilities (CVE-2011-2443) could cause a crash and …

FFmpeg multiple vulnerabilities

Multiple vulnerabilities have been reported in FFmpeg, which can be exploited by malicious people to cause a Denial of Service and potentially compromise a user’s …

Webroot SecureAnywhere integrates PC, Android and iOS security

Following Kaspersky One and McAfee All Access, Webroot announced centralized security management for PC, Android and iOS users. Webroot SecureAnywhere enables users to manage …

Trend Micro Deep Security Parns Common Criteria EAL 4+ certification

Trend Micro announced that its advanced server and virtualization security solution, Deep Security achieved Common Criteria Evaluation Assurance Level 4 augmented (EAL 4+) …

Key issues facing SaaS industry

More than 95 percent of organizations expect to maintain or increase their investments in software as a service (SaaS) and more than one-third have migration projects under …

Symantec IM Manager multiple vulnerabilities

Multiple vulnerabilities have been reported in Symantec IM Manager, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to …

XenServer 6 released

Citrix Systems released XenServer 6. As a key component of the Citrix cloud computing and virtualisation strategy, XenServer 6 brings new optimizations and improved …

25% of tested Google Chrome extensions allow data theft

27 of a 100 tested Google Chrome extensions have been found vulnerable to data (passwords, history, etc.) extraction attacks though specially crafted malicious websites or by …

Amazon introduces Silk, a cloud-accelerated web browser

Amazon Silk introduces a “split browser” architecture that accelerates the power of the mobile device hardware by using the computing speed and power of the Amazon …

IP Address Management platform Proteus 3.7 released

BlueCat Networks announced the latest release of Proteus, a scalable IP Address Management (IPAM) platform. Proteus 3.7 delivers enhanced usability, scalability, seamless …

Don't miss

Cybersecurity news