Please turn on your JavaScript for this page to function normally.
Record malware growth in China, Ukraine and Saudi Arabia

51,000 new mobile malware threats were identified in the first half of 2013, infecting an estimated 21 million mobile devices, according to NQ Mobile. Highlights of report …

TOR-based botnets on the rise

Keeping their botnet’s C&C centers online is crucial for bot herders, so that they can keep taking advantage of the computers they zombified. But given that cyber …

US lawmakers shoot down legislation for limiting NSA spying

An amendment to the Department of Defense Appropriations Act of 2014 that would curtail funding for NSA’s collection of electronic communication data in cases where the …

Economic growth and national security are at risk

FTSE 350 companies that are vital to Britain’s economic growth, and crucial to national security, are leaking data that can be used by cyber attackers to gain control of …

DHS to set up “cybersecurity shop” for govt agencies

The US Department of Homeland Security has been tasked with setting up a centralized shopping hub to which all the other US federal, state and local agencies us to get the …

Bit9 Introduces enterprise Mac security

Business users are driving demand for Macs across the enterprise. Until now, the few enterprise security products available for the Mac were dependent on malware signatures …

Key security metrics revealed

A new Ponemon Institute study examined the key risk-based security metrics IT security managers used most frequently to gauge the effectiveness of their organizations’ …

Malicious apps exploiting Android “Master Key” bug found

Malicious apps misusing on of the two recently discovered Android “Master Key” bugs to successfully pose as legitimate ones have been discovered on third-party …

A historical overview of the cyberattack landscape

Over the past 16 years, sensitive data and the complex IT infrastructure within Global 2000 enterprises used to create, distribute, and protect it has grown exponentially. …

The rise of sophisticated malware

A recent Enterprise Strategy Group (ESG) research study focused on advanced malware protection and detection. The study revealed that enterprise organizations are seeing an …

Executives lack confidence in their cyber security

More than two-thirds of executives are concerned their companies will not be able to stop such threats, and one in five say their biggest concern is not knowing whether an …

Solera Networks enhances advanced threat protection

Solera Networks introduced the Blue Coat ThreatBLADES, making it possible for enterprises to protect against and resolve advanced targeted attacks. ThreatBLADES unify threat …

Don't miss

Cybersecurity news