Please turn on your JavaScript for this page to function normally.
With crypto being insecure, whom do you trust?

Last week’s revelation that the NSA has for years now concentrated on subverting the encryption that protects commerce and banking transactions, sensitive data, e-mails, …

Fake emails saying US is bombing Syria lead to malware

Two distinct spam campaigns taking advantage of the current political situation in Syria have been spotted by Symantec and Kaspersky Lab researchers. The first one consists of …

McAfee releases 2014 core PC security products

McAfee announced its new 2014 line of core PC security suites delivering increased power and performance with a lighter and faster footprint resulting in an enhanced user …

How important is penetration testing?

With cyber attacks becoming the norm, it is more important than ever before to undertake regular vulnerability scans and penetration testing to identify vulnerabilities and …

Exploring attacks against PHP applications

Imperva released its September Hacker Intelligence Initiative report which presents an in-depth view of recent attacks against PHP applications, including attacks that involve …

Free asset tracking for SMBs

GFI Software announced Free Asset Tracking Forever, a no-charge component of the GFI Cloud suite of cloud-based IT management services that enables organizations to audit and …

SpydrSafe Mobile Security 2.0 released

SpydrSafe 2.0 integrates with and leverages iOS 7’s new native application management capabilities. In addition, it delivers an array of proprietary, advanced security …

Anonymous user authentication from LaunchKey

LaunchKey introduced anonymous user authentication capabilities as part of its technology platform that kills passwords. The new multi-factor authentication technology …

Week in review: FinFisher’s spying capabilities, and NSA’s quest to subvert encryption

Here’s an overview of some of last week’s most interesting news and articles: The TAO of NSA It has been pointed out that NSA has its own hacking unit called …

Backdoor brute-forces Joomla and WordPress sites

A recently discovered backdoor with brute-forcing capabilities that are used against Joomla- and WordPress-managed blogs has shown, once again, the importance of keeping your …

NSA’s quest to subvert encryption, install backdoors

Journalists from the NYT and ProPublica have joined efforts and have published the most explosive article to date dealing with revelations about NSA spying efforts. Backed by …

Massive spike of Tor users caused by Mevade botnet

When Project Tor director Roger Dingledine recently drew the public’s attention to the unusual and considerable rise in the number of Tor users, he invited people to …

Don't miss

Cybersecurity news