Please turn on your JavaScript for this page to function normally.
Dell acquires Enstratius

Dell today announced the acquisition of Enstratius, which helps organizations manage applications across private, public and hybrid clouds, including automated application …

IE8 0-day used in watering hole attacks

Last week a U.S. Department of Labor website was discovered to be redirecting users to sites serving a hard-to-detect variant Poison Ivy backdoor Trojan. Researchers are now …

McAfee to acquire Stonesoft

McAfee and Stonesoft today announced a definitive agreement to initiate a conditional tender offer for the acquisition of Stonesoft for approximately $389 million in cash. …

Malware you can “live with”, but shouldn’t

The main symptom of a computer being infected with the ZeroAccess (or Sirefef) malware is that online searches via Google Search often lead to unhelpful pages filled with ads …

No strategy for data protection?

While financial services organizations are obligated to establish and report stringent service availability objectives for mission-critical systems, they are actually among …

Cain & Abel 4.9.44 released

Cain & Abel is a password recovery tool for Microsoft operating systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted …

Week in review: Google Glass hacked, Bitcoin risks, and why we need security awareness training programs

Here’s an overview of some of last week’s most interesting news, reviews and articles: Info of 50M LivingSocial customers compromised following breach …

IRC/HTTP based DDoS bot nukes other bots

Online underground markets seem to offer anything and everything a budding cyber criminal might need. Compromised online accounts? They’ve got them. Malicious domain …

Top Android AV software fooled by common evasion techniques

A team of researchers from Northwestern University and North Carolina State University have tested ten of the most popular Android anti-virus software and have discovered that …

Multi-stage exploit attacks for more effective malware delivery

Most drive-by exploit kits use a minimal exploit shellcode that downloads and runs the final payload. This is akin to a two-stage ICBM (InterContinental Ballistic Missile) …

Trojans account for 80% of malware infections

PandaLabs today published its report analyzing the IT security events and incidents from January through March 2013. In the first quarter of 2013 alone, more than six and a …

Ex employee hacked into high-voltage power manufacturer’s network

A criminal complaint was unsealed on Thursday in federal court in the Eastern District of New York charging Michael Meneses – who was arrested earlier that day in …

Don't miss

Cybersecurity news