Please turn on your JavaScript for this page to function normally.
Automate security policy management for business applications

AlgoSec announced BusinessFlow, a new product that automates security policy management for business applications and provides the link between application connectivity …

Georgia shows photos of Russian-based hacker spy

A Russian-based hacker has been unmasked as one of the attackers behind a long-standing campaign aimed at compromising computers belonging to Georgian ministries, parliament, …

Can the Nuclear exploit kit dethrone Blackhole?

In a market dominated by the mega-popular Blackhole exploit kit (newly upgraded to version 2.0) and the somewhat less sought-after Eleonore and Phoenix exploit packs, can the …

Bank of America customers under phishing attack

Bank of America customers, beware – the old “account suspended” warning purportedly sent by your bank’s Cardmember Services is hitting inboxes once …

Gang steals over $1M by exploiting Citigroup e-payment flaw

Fourteen individuals were charged following a FBI-led investigation into the theft of over $1 million from Citibank using cash advance kiosks at casinos located in Southern …

Application Security updates its database scanning tool

Application Security announced the latest release of its database scanning tool, AppDetectivePro. Expanded capabilities and a new user interface provide security, risk and IT …

Secunia Vulnerability Intelligence Manager 4.0 released

The Secunia VIM 4.0 covers more than 40,000 software systems and applications. Its provides intelligence about software vulnerabilities available to organizations, ensuring …

Microsoft’s worldwide threat assessment

In this podcast recorded at RSA Conference Europe 2012, Tim Rains, the Director of Product Management at Microsoft’s TWC group, talks about volume 13 of …

EMC to acquire Silver Tail Systems

EMC has signed a definitive agreement to acquire Silver Tail Systems, a provider of real-time web session intelligence and behavioral analysis. Terms of the deal were not …

Interactive CERT map from ENISA

ENISA has published a new interactive CERT map and Inventory of CERT’s activities in Europe containing publicly listed teams and co-operation, support and …

Trojan Horse: A Novel

It’s two years after the Zero Day attacks, and cyber-security analyst Jeff Aiken is reaping the rewards for crippling Al-Qaida’s assault on the computer …

Facebook investigates data leak from 1 million accounts

Facebook will be launching an internal investigation following the revelation by Czech blogger Bogomil Shopov that data belonging to over one million Facebook users was …

Don't miss

Cybersecurity news