Please turn on your JavaScript for this page to function normally.
Rootkit detector for OS X

ESET Rootkit Detector is a new security tool for OS X that scans for malicious kernel extensions attempting to change operating system behavior by hooking inside the OS. When …

Widespread disregard for corporate cloud policies

While most business professionals are worried about the security of cloud-based applications, they are not deterred from using them to store their personal and professional …

Researcher despairs of critical SIM flaws being fixed before attacks happen

Two months have passed since researcher Karsten Nohl announced that he has found and managed to leverage critical flaws in the encryption technology used by some SIM cards, …

Cisco enhances safety and security solutions

Cisco announced enhancements to its portfolio of safety and security solutions with video surveillance architectures and new Internet of Things (IoT) enabled solutions that …

A short overview of Android banking malware

As more and more people use their mobile phones to do their online banking, money transfers, and so on, cyber crooks wielding banking malware are increasingly turning to …

IE 0-day attack reports push ISC to raise official threat level

Over the weekend, FireEye researchers have managed to shed some light on the in-the-wild attacks leveraging the latest discovered Internet Explorer zero-day vulnerability …

Federal cyber security pros lack confidence in FISMA

A report by MeriTalk and NetApp examines the state of cyber security at Federal agencies and looks at whether the Federal Information Security Management Act (FISMA) is …

Big data investments continue to rise

Big data investments in 2013 continue to rise, with 64 percent of organizations investing or planning to invest in big data technology compared with 58 percent in 2012, …

Is your status update also a red flag for danger?

In this digital age when our whole lives are online, it is no surprise that security has become an increasing concern of many. Whilst you’re busy worrying about your …

HP unveils new family of next-generation firewall appliances

HP unveiled its new family of HP TippingPoint Next-Generation Firewall (NGFW) appliances to further protect customers from threats introduced by mobile and cloud computing. …

Week in review: Undetectable hardware Trojans, Chinese hackers for hire, and latest IE 0-day insight

Here’s an overview of some of last week’s most interesting news and articles: NSA impersonated Google in MitM attacks After all the recent revelations about the …

RSA advises customers to stop using NSA-influenced encryption algorithm

In the wake of the disclosure that the NSA has influenced NIST to adopt an encryption standard that includes one random bit generator with a weakness known only to the …

Don't miss

Cybersecurity news