Please turn on your JavaScript for this page to function normally.
McAfee unveils Complete Endpoint Protection suites

McAfee introduced two new suites: McAfee Complete Endpoint Protection – Enterprise, and McAfee Complete Endpoint Protection – Business. The suites include McAfee …

Backup large data with Big Cloud

Sterling Data Storage released its largest data backup solution yet — the Big Cloud. It was designed for companies needing to securely store large amounts without sacrificing …

Can mobile malware be activated via sensors?

Can mobile malware be activated via sensors available on current mobile devices, and receive commands through out-of-band communication methods? If you ask a group of …

How secure is quantum cryptography?

Quantum communication systems offer the promise of virtually unbreakable encryption. Unlike classical encryption, which is used to send secure data over networks today and …

U.S. weapons systems designs reportedly stolen by hackers

Hackers – more than likely Chinese – have stolen designs for two dozen U.S. weapons systems during a series of raids, a previously undisclosed section of a report …

Brazilian govt sites found serving malware

Cyber crooks targeting Brazilian users have a well-documented predilection for banking Trojans, but every now and then they opt for other types of malware. Trend Micro …

DNS anomaly detection: Defend against sophisticated malware

Not so long ago, the standard way of looking for a malware infection was to simply monitor web traffic. By looking, for example, for HTTP requests to google.com/webhp – …

Liberty Reserve founder arrested, site and service inaccessible

When the website of Liberty Reserve, a Costa Rica-based payment processor popular with cyber criminals, became inaccessible late last week, speculation about what caused were …

Week in review: Scanner that identifies malware strains, Twitter offers 2FA

Here’s an overview of some of last week’s most interesting news, reviews and articles: The CSO perspective on healthcare security and compliance Randall Gamby is …

Scanner identifies malware strains, could be future of AV

When it comes to spotting malware, signature-based detection, heuristics and cloud-based recognition and information sharing used by many antivirus solutions today work well …

Killer apps: The performance of networked applications

Ipanema Technologies and Easynet Global Services unveiled the results of Killer Apps 2013, a major study into the performance of networked applications. Networking budgets are …

Zeus variants are back with a vengeance

After analyzing the feedback from the company’s Smart Protection Network, Trend Micro researchers have noted an upswing in attempted Zeus / Zbot Trojan infections. After …

Don't miss

Cybersecurity news