Please turn on your JavaScript for this page to function normally.
Watch out for less advanced malware and new exploit kits

This year, cybersecurity took center stage with nation-state attacks, numerous high-profile data breaches and prominent cybercriminal arrests. Websense Security Labs outlined …

5 mobile app security tips

ICSA Labs released a list of 5 mobile app security tips to help enterprises protect their data. 1. Dynamic analysis is a must. If deploying security tested mobile applications …

The state of governmental cloud deployments in Europe

The EU’s cybersecurity Agency ENISA has analyzed the present state of play regarding governmental cloud deployment in 23 countries across Europe. In the report the …

Unapproved cloud products put company data at risk

Egnyte released results from a new survey by Harris Interactive among 2,020 U.S. adults illustrates a major exposure for today’s businesses when it comes to the transfer …

MOVEit Cloud 8.0 extends managed file transfer to mobile devices

Ipswitch File Transfer launched MOVEit Cloud 8.0, adding mobile support to the MOVEit Managed File Transfer (MFT) cloud service. The MOVEit MFT system is used by businesses …

Safari, Chrome and Samsung Galaxy S4 taken down in Mobile Pwn2Own

Results from the second annual Mobile Pwn2Own competition ending today at PacSec Applied Security Conference in Tokyo, Japan, are in: the successful compromises include …

Microsoft unveils state-of-the-art Cybercrime Center

Microsoft announced the opening of the Microsoft Cybercrime Center, which combines Microsoft’s legal and technical expertise as well as tools and technology with …

Spam campaign doubles on threats

Some malware peddlers might be moving on from using the Blackhole exploit kit to deliver malicious code, but others are still not ready to give up on it, as proven by a spam …

Alliance dedicated to wireless biometric authentication launched

Natural Security has announced the launch and newly elected governing board of the world’s first open Alliance dedicated to secure transactions based on wireless and …

Compromised Adobe accounts include military and government users

The Adobe hack is truly gargantuan, what with all the stolen source code of a number of extremely popular software and the exfiltrated database containing user email …

Microsoft announces retiring of SHA-1

Along with the standard security advisories released on this month’s Patch Tuesday, Microsoft has also released a few that announce the company’s intention to …

Sinowal and Zbot Trojan collaborate in new attack

Trend Micro researchers have recently come across an interesting example of malware collaboration involving the Zeus banking Trojan and a new variant of the password-stealing …

Don't miss

Cybersecurity news