Please turn on your JavaScript for this page to function normally.
Cyber crooks misuse Google service to control Android Trojans

Cybercriminals have been spotted using a novel method of controlling Android mobile malware: a legitimate service called Google Cloud Messaging. GCM has been created to allow …

Hacker hijacks baby monitor camera, terrorizes family

A Houston, Texas couple got a great shock this weekend when they heard a male voice coming from a room where their two year old was sleeping. They heard the man shouting to …

Free Android anti-virus for mobile devices

Avira Free Android Security reached 2.0 and offers antivirus scanning and removal, as well as retaining the remote lock, wipe and “scream’ features available in …

Sweeping mobile phishing attack requests bank customers’ ID scans

A very thorough phishing campaign is targeting customers of JPMorgan Chase Bank who use their mobile phones to do their online banking, warn Trend Micro researchers. The …

Skyhigh Secure: Data security for information in the cloud

Skyhigh Networks announced Skyhigh Secure, a solution that enables organizations to address their critical cloud data protection requirements – including contextual …

AIAA releases framework for aviation cybersecurity

The American Institute of Aeronautics and Astronautics (AIAA) has released its decision paper “A Framework for Aviation Cybersecurity.” It outlines the existing …

Kaspersky updates its security solutions for home users

Kaspersky Lab released Kaspersky Anti-Virus 2014 and Kaspersky Internet Security 2014. Both products now include ZETA Shield antivirus technology, which performs an in-depth …

MS SQL Agent facilitates the collection of MSSQL audit records

SNARE for MSSQL allows a security administrator to remotely set up, control and monitor the application through a standard web browser and a self-contained installation …

Intigua: Automate the provisioning of management technologies

CIOs today are asking their IT teams to build private clouds that reflect the on-demand simplicity and agility that Amazon Web Services delivers in its public cloud. Unlike …

Microsoft releases critical fixes for IE and Exchange Server

There’s a remotely exploitable, publicly disclosed, critical remote code execution vulnerability in Microsoft Exchange (MS13-061)! But wait, is it really remotely …

Malicious ads lead to outdated adware-laden Firefox “update”

A series of Internet campaigns pushing bogus Firefox updates onto unwary users have been spotted by researchers, and among them is one that lures them in through “Green …

Multi-service authentication via palm vein images

Fujitsu has been creating and releasing palm vein biometric authentication and identification systems for over a decade, but have now presented a new one that definitely …

Don't miss

Cybersecurity news