Please turn on your JavaScript for this page to function normally.
DDoS botnet spreading on Linux and Windows machines

A blended DDoS botnet consisting of both Windows and Linux machines has been detected by researchers working with the Polish CERT. The botnet is exclusively dedicated to …

Effective new Trojan skims card info from widely used ATMs

Researchers from Russian AV company Doctor Web have managed to get their hands on a Trojan aimed at recording and collecting card information from one of the most widespread …

Easily deflected ransomware relies on victims’ embarrassment

The appearance of Browlock ransomware earlier this year demonstrates that this type of malware does not need to wreak much havoc on the targets’ computer to be taken …

What’s the greatest security risk?

While boardrooms across the U.S. report growing prioritization of endpoint security, risk continues to grow and evolve and IT departments are racing to keep up, according to a …

SolarWinds enhances security tools

SolarWinds announced enhancements to several of its security management solutions, including SolarWinds Log & Event Manager, SolarWinds Firewall Security Manager and …

Top 8 security insights for 2014

BeyondTrust’s Advanced Research labs has identified what they believe will be the top 8 pain points and “big deals” in security in 2014. Threat vectors: 2014 …

Authentication using visual codes: what can go wrong

Several password replacement schemes have been suggested that use a visual code to log in. However the visual code can often be relayed, which opens up a major vulnerability. …

IE flaw targeted in Aurora attacks still actively exploited

Regular software patching is often touted as one of the best things you can do to keep your computer safe against malware infection. Unfortunately, not all users follow that …

How effective are Android AV solutions?

As the onslaught of Android malware continues, the recently released testing results by independent IT-security institute AV-Test show that most providers of Android antivirus …

Mozilla blocks rogue add-on that made computers scan sites for flaws

A singular new botnet composed of over 12,500 infected computers has been used by its masters to effectively crowdsource the search for websites vulnerable to SQL injection …

Datacard Group to acquire Entrust

Datacard Group has entered into an agreement to acquire Entrust. The acquisition is expected to close on December 31, 2013, subject to regulatory approval and customary …

Convenience still overrides security for mobile shoppers

Despite a huge increase in shopping on mobile handsets, shoppers do not have security in place to protect the identity and credit card data stored on the devices, according to …

Don't miss

Cybersecurity news