SanDisk unveils security-certified self-encrypting X300s SSD
SanDisk unveiled the company’s first, self-encrypting solid state drive (SSD) – the SanDisk X300s SSD. Leveraging TCG Opal 2.0 and Microsoft Encrypted Hard Drive …
Cybercriminals targeting unlikely sources to carry out high-profile exploits
Cybercriminals continuously discover more ways to successfully target new outlets for financial theft, according to Trend Micro. Greed is motivating cybercriminals to take a …
Bad news for Cryptocat as it debuts Encrypted Facebook Chat
Mere days after Cryptocat creator Nadim Kobeissi announced that the latest update of the popular software will allow Facebook users to use encrypted chat, the social network …
New browser hijacker/click fraud malware threatens Windows users
In its latest Security Intelligence Report, Microsoft has noted that malware designed to make money for the attacker via click fraud, performing Bitcoin mining, and …
LanGuard 2014 R2 comes with enhanced vulnerability assessment, patch management
GFI Software released GFI LanGuard 2014 R2, the latest version of the company’s comprehensive network vulnerability scanning and patch management solution. This next …
Phishing campaigns target diverse webmail users at once
Every now and then, phishers mount campaigns that simultaneously target users of different online services. This time the lures are different: access to a document that is …
Average enterprise generates 10,000 security events daily
Damballa released its Q1 2014 State of Infections Report, compiled from analysis of 50% of North American ISP Internet traffic and 33% of mobile traffic, plus large volumes of …
Arrests in international voice-phishing case
Belgian and Dutch judicial and law enforcement authorities, supported by the European Cybercrime Centre (EC3) at Europol and Eurojust, have concluded an operation resulting in …
NIST guidelines help developers build security in from the start
A new initiative by computer security experts at the National Institute of Standards and Technology (NIST) seeks to bring widely recognized systems and software engineering …
The evolution of an Iranian hacker group
Iran-based hacker groups have traditionally concentrated more on website defacement and DDoS attacks aimed at making a political statement, but as time passes, some of those …
Despite hearing about Heartbleed, 47% have not changed their passwords
In light of the recent Heartbleed bug, LifeLock announced survey results that reveal consumers’ behavior and attitudes surrounding the security flaw. The recent survey, …
Toshiba launches HDDs for surveillance applications
Toshiba launched the MD03ACA-V series, high-capacity hard disk drives for surveillance applications. Toshiba’s purpose-built line of 3.5-inch HDDs are available in …
Featured news
Resources
Don't miss
- Vulnerable firmware for Gigabyte motherboards could allow bootkit installation
- AsyncRAT evolves as ESET tracks its most popular malware forks
- Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech
- Securing vehicles as they become platforms for code and data
- How service providers can turn cybersecurity into a scalable MRR engine