Sophos extends UTM to the enterprise
Sophos has strengthened its network security offerings with two enhanced high-end UTM appliances, Sophos UTM 525 and 625, and the new Sophos RED 50 (Remote Ethernet Device), …
Data protection practices in EU and Asia
Research undertaken by Field Fisher Waterhouse into the existing legal framework mandating encryption of personal data in the EU and Asia details legal requirements and …
New security startup tackles strong authentication
Nok Nok Labs launched today. Through its Unified Authentication Infrastructure, which leverages existing technologies such as fingerprint sensors or webcams, TPM chips, or …
Social engineering: Clear and present danger
Although many companies in the information security industry prefer to tackle challenges with sophisticated hardware, the art of lying continues to be a towering risk …
Dorkbot worm lurks on Skype and MSN Messenger again
The Dorkbot/Rodpicom worm, which spreads via messaging applications and leads to additional malware infections, is currently doing rounds on Skype and MSN Messenger, warns …
Bogus money transfer notice leads to theft of online banking credentials
Symantec researchers have recently spotted an email phishing campaign impersonating the accounting department of a random firm. “Dear Sir,” says the email, …
Myanmar journalists targeted with state-sponsored Gmail attacks
Google has recently begun warning Myanmar journalists and editors about their Gmail accounts potentially being targeted by state-sponsored attackers. The warning – first …
Tweet your way to a VIP ticket to HITBSecConf2013 in Amsterdam
Hack In The Box launched the #HITB1337Giveaway – A Twitter based competition that will see one lucky winner not only walk away with a VIP ticket to the triple track …
Pope’s resignation exploited by Twitter spammers
The announcement of the resignation of Pope Benedict XVI later this month has taken the world by surprise, but spammers were quick to react to the news by flooding Twitter …
BYOD is just the tip of the iceberg
The growth in cloud storage devices means that corporate IT departments are now at the mercy of consumer-based applications, as more and more employees look to take their work …
Bit9 hacked, its certificates stolen and used to sign malware
Bit9, a security firm that provides software reputation, application control and whitelisting services to companies in the financial, technology, government and other sectors, …
Cybersecurity concerns of online dating
ThreatMetrix announced several ways for consumers to stay protected from online dating fraud and malware as Valentine’s Day approaches. According to Fast Company, online …
Featured news
Sponsored
Don't miss
- Critical RCE bug in SolarWinds Web Help Desk fixed (CVE-2024-28986)
- How passkeys eliminate password management headaches
- Delta vs. CrowdStrike: The duties vendors owe to customers – or do they?
- IntelOwl: Open-source threat intelligence management
- Current attacks, targets, and other threat landscape trends