Please turn on your JavaScript for this page to function normally.
Microsoft to patch 57 vulnerabilities

The February 2013 Microsoft Patch Tuesday bulletin was released with 12 advisories and is bigger than average, which means security and IT teams will be busier than average. …

Critical flaw lets attackers control hospital, military buildings’ systems

A critical zero-day remote-access vulnerability in an industrial control system that is widely used in hospitals, military installations, manufacturing plants and other …

Despite concerns, smartphone hotspot adoption grows

Sixty-two percent of smartphone users leverage their devices’ hotspot capabilities, an increase of nine percent since May 2012, according to a new uSamp survey of more …

EU proposes to make data breach disclosure mandatory

The European Commission has today announced the launch of new proposals that include a requirement for EU member states to appoint an independent CERT and pivotally calls for …

Massive Bamital click-fraud botnet shut down

Symantec and Microsoft have teamed up to take down the Bamital botnet, and are currently in the process of warning users infected with the Trojan on how to remove it from …

Whitehole exploit kit in the spotlight

The effectiveness of exploit kits has made them malware peddlers’ preferred way of distributing their malicious wares. The Blackhole exploit kit is, by far, the most …

F-Secure Client Security updated with threat detection technology

As the cost of cybercrime continues to soar, affecting businesses around the world, F-Secure is introducing the latest version of its corporate endpoint security product, …

BYOD is increasing IT frustration and loss of control

IT is concerned about rising mobility costs and feeling frustration and loss of control over BYOD, according to iPass and MobileIron. The majority of survey respondents (57 …

Aegis Bio: Encrypted USB 3.0 drive with biometric fingerprint access

Apricorn announced the Aegis Bio 3.0, a software-free biometric USB 3.0 drive that safeguards data with secure fingerprint access and military grade 265-bit AES-XTS hardware …

Information security: Understanding a global picture in a local context

“Think globally, act locally” is a phrase now cliche because it expresses an incontrovertible and immediately graspable truth. The global/local concept applies …

Cyber risk perceptions revealed

A survey of perceptions about cyber risk found that among corporate executives, more are concerned about cyber threats than about other major business risks. More than 85% of …

Researcher warns about critical flaw in D-Link routers

A security flaw in D-Link’s DIR-300 and DIR-600 routers could allow remote attackers to inject execute arbitrary shell commands via a simple POST request without being …

Don't miss

Cybersecurity news