Please turn on your JavaScript for this page to function normally.
HTML ransomware goes global

Last week we saw that a ransomware scheme does not need to involve actual malware, as clever cyber crooks leveraged browsers’ “restore from crash” feature to …

Cisco to acquire Sourcefire for $2.7 billion

Cisco will acquire Sourcefire, a provider of cybersecurity solutions. The acquisition adds a team with deep security DNA to Cisco and will accelerate delivery of Cisco’s …

U.S. the number one source of web attacks

Retailers suffer twice as many SQL injection attacks as other industries, according to Imperva. Additionally, these attacks were more intense, both in terms of number of …

Ubuntu Forums hacker won’t publish stolen passwords

The Ubuntu Forums are still down following this weekend’s breach claimed by a hacker that goes by the online handle “Sputn1k_”, and there is no news on when …

Quarri delivers Protect On Q as a virtual appliance

Quarri Technologies released Quarri Protect On Q (POQ) 3.2, a virtual appliance version of its flagship web browser security solution. It also delivers high availability, …

Combat Arms players, beware of free NX generators

Players of the popular Combat Arms first-person shooter are being targeted by online crooks via the in-game chat system, warns Chris Boyd. They crooks offer what is supposedly …

Deliver real-time phishing detection from Webroot and RSA

Webroot announced a technology partnership with RSA, The Security Division of EMC, to provide real-time phishing detection to RSA FraudActionSM Anti-Phishing Service. Phishing …

Study connects cybercrime to job loss

After years of guesswork and innumerable attempts to quantify the costly effects of cybercrime on the U.S. and world economies, McAfee engaged the Center for Strategic and …

Children as adversaries in technologically-enhanced homes

You might sometimes consider your child an adversary when he or she prevents you from sleeping enough hours or having a sit-down meal without interruptions, but Microsoft …

Multiple Java versions on endpoints risky for enterprises

Java represents a significant security risk to enterprises because it is the endpoint technology most targeted by cyber attacks, show the results of Bit9 research. The …

New ReadyNAS rackmount devices from NETGEAR

NETGEAR announced ReadyNAS 3220 and ReadyNAS 4220, the latest NAS products to run on the ReadyNAS OS, introduced in March 2013. Available in 2U rackmount form with 12-bay …

Passwords of 1.8M Ubuntu Forums users compromised in hack

Ubuntuforums.org, the home of a variety of support forums dedicated to users of this popular Linux distribution, has been hacked over the weekend and defaced to show an image …

Don't miss

Cybersecurity news