Please turn on your JavaScript for this page to function normally.
Shylock’s new trick for evading malware researchers

Shylock is a financial malware platform discovered by Trusteer in 2011. Like most malware strains, Shylock continues to evolve in order to bypass new defensive technologies …

Mobile and cloud developments will dominate 2013

For the past several years, the IT industry’s transition to the 3rd Platform, built on mobile computing, cloud services, social networking, and big data analytics …

Metaforic releases software protection technology

Metaforic unveiled several new technology advancements that make it easier for software creators to protect a wide range of software (mobile, embedded, desktop, server) …

AVG releases Safe Browser for iOS, updates AntiVirus for Android

AVG updated its AntiVirus for Android and launched the new AVG Safe Browser for iOS. The main eye catcher in AVG AntiVirus for Android version 3.0.2 is the new user interface. …

Mobile communications hub with embedded encryption

API Technologies announced the new SST Secure Communications Hub (SCH) with integrated encryption. The SB1500ER Secure Communication Hub is a single, integrated device that …

Trend Micro cloud security optimized for Amazon Web Services

Amazon Web Services (AWS) customers are able to take advantage of optimized security solutions from Trend Micro for their AWS deployments, including the AWS Storage Gateway. …

UN atomic energy agency confirms breach into its server

It has been confirmed that the email addresses recently leaked by anti-Israel hacker group “Parastoo” have been stolen from a server belonging to the International …

Bogus Amazon account compromise notice leads to phishing

A phishing email impersonating Amazon is hitting users’ inboxes, trying to trick them into believing that various computers connected to their Amazon account and …

Essential safe shopping tips

Based on Kaspersky Lab’s world-wide insight into malicious software and online scammers, the company offers the following 10 warnings and tips for online shoppers: …

Unencrypted payment data on business networks at 70%

SecurityMetrics published its second annual Payment Card Threat Report revealing unencrypted PAN (Primary Account Number) storage remains alarmingly high. Virtually no change …

Top 5 security threats for 2013

The Information Security Forum announced their forecast of the top five security threats businesses will face in 2013. Key threats include cyber security, supply chain …

Festive but fake UPS notification leads to fake AV

Fake UPS delivery notifications hit inboxes with regularity during the entire year, and usually don’t need “special effects” to trick users into downloading …

Don't miss

Cybersecurity news