Please turn on your JavaScript for this page to function normally.
Real-time apps and FTP are preferred malware targets

Palo Alto Networks published an analysis of new and evasive malware in live enterprise networks. Their findings show that traditional antivirus solutions are not identifying …

Targeted attacks and real world hacks

Web application attacks are the most significant security threat for IT infrastructures, according to Alert Logic. During a six-month study period, Alert Logic found that 48 …

PrivacyScan expands cleaning support for Internet and desktop apps

PrivacyScan 1.2 is now available in the Mac App Store with updated privacy cleaning features and support. PrivacyScan protects online and offline privacy by shredding files …

Chinese university tied to “APT1” army cyber unit

By now everybody in the security industry has read the Mandiant APT1 report or at least a TEXTsummary of it, and has heard the many voices of either agreement or dissent …

Fake BBC emails lead to Blackhole, Zeus

Spam emails supposedly coming from CNN and the BBC and delivering links to trending news stories have once again become the preferred way for malware peddlers to lure …

Digital cameras easily turned into spying devices, researchers prove

Users’ desire to share things online has influenced many markets, including the digital camera one. Newer cameras increasingly sport built-in Wi-Fi capabilities or allow …

Employees deliberately ignore security rules

A recent survey from Lieberman Software reveals that more than 80% of IT security professionals believe that corporate employees deliberately ignore security rules issued by …

What do users look for in a security solution?

Users are aware of the dangers in the Internet and most of them are already using a security solution, say the results of AV-Comparatives’ annual survey that polled …

Hacking for good: Kickstart a documentary about hackers in Uganda

While the information security community is largely accustomed to the term “hacking” being used to describe criminal computer activity in the mainstream media, …

Five cuffed for stealing 2M euros via e-banking hacks

Five people were arrested last week when the Slovenian police conducted a series of house searches following an investigation into an gang that was emptying business bank …

Attacking SCADA wireless systems

Leased lines are recurring costs throughout the power grid. The bottom line demands the use of wireless solutions where possible. Dare we? We already do. The video below, …

Mobile device data recoveries surge

Kroll Ontrack saw a 55 percent increase in mobile device recoveries for phones and tablets from 2010 to 2011, and a 161 percent increase from 2011 to 2012. With more and more …

Don't miss

Cybersecurity news