Please turn on your JavaScript for this page to function normally.
Analysis of Poison Ivy remote access tool

A new FireEye report highlights the resurgence of Poison Ivy, a malware Remote Access Tool (RAT) that has remained popular and effective eight years after its original release …

The mobile cybercrime landscape is becoming more defined

McAfee found that Android-based malware achieved a 35 percent growth rate not seen since early 2012. This rebound was marked by the continued proliferation of SMS-stealing …

Rapid7 unveils analytics for security controls and user risk

Rapid7 showcased two new IT security insight solutions at the UNITED 2013 security summit. Lee Weiner, senior vice president of products and engineering at Rapid7 comments: …

Veeam Backup & Replication 7 released

Veeam Software announced Veeam Backup & Replication 7, which introduces built-in WAN acceleration and backup from storage snapshots. Built-in WAN acceleration copies data …

Is evading an IP address block to access a website against the law?

A ruling in a lawsuit mounted by Craigslist and against ad indexing firm 3Taps has once again brought attention to the Computer Fraud and Abuse Act (CFAA), its vague wording, …

MitB malware targets steam

When cybercriminals use Man-in-the-Browser (MitB) malware to commit online fraud, financial institutions are not their only targets. Dating, eCommerce, hospitality, and travel …

Groklaw shuttered because email is no longer safe

Since 2003, Pamela Jones – then a simple paralegal, now a journalist and editor – covered legal news regarding free and open source software on her law blog …

UK agents detain Greenwald’s partner, destroy The Guardian’s hard drives

It has been an eventful weekend for The Guardian newspaper, its reporter Glenn Greenwald and his partner David Miranda, as the British police held the latter and questioned …

Nmap 6.40 released

Nmap is a free and open source utility for network exploration or security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the …

Why continuous IT cost optimization is essential

After years of tactical cost-cutting, many organizations now face the challenge of continuous IT cost optimization after the realization that optimization practices are never …

EVault backup appliances now with cloud-connected software for failproof recovery

EVault announced a new portfolio of EVault backup appliances, expanding its enterprise-grade appliances to accommodate the backup and recovery needs of any organization …

ENISA analyzes major security incidents in the EU

The European Union Agency for Network and Information Security (ENISA) today issued a new report providing an overview of the major outage incidents in the EU in 2012. The …

Don't miss

Cybersecurity news