Please turn on your JavaScript for this page to function normally.
Week in review: Blackhole 2.0 is out, Windows 8 users open to Flash exploits, and botnet C&Cs hidden in the Tor network

Here’s an overview of some of last week’s most interesting news and articles: Apache HTTP Server set to ignore IE10’s Do Not Track request Microsoft’s …

The various spam campaigns leading to Blackhole

At any given time, there is a considerable number of email spam campaigns that ultimately lead users to pages hosting exploit kits – more often then not the extremely …

Android malware threats analysis

Bitdefender released its August 2012 Android malware threats report. While in August the percentage of adware-bundled apps dropped to 55.15 per cent, from July’s 77.34 …

Best practices for mobile software developers

The PCI Security Standards Council (PCI SSC), a global, open industry standards body providing management of the Payment Card Industry Data Security Standard (PCI DSS), …

Worldwide security infrastructure market will grow 8.4%

While the global economic slowdown has been putting pressure on IT budgets, security is expected to remain a priority through 2016, according to Gartner. Worldwide spending on …

Beware of FIFA World Cup-themed phishing attempts

For scammers, any lure that has the ability to capture the attention of a great number of users is good, and popular sport events on an international level are a prime example …

Messaging security platform for mobile network operators

Cloudmark announced Cloudmark Mobile Platform 3.0, a solution that provides real-time visibility and control of mobile messaging threats originating from internal or external …

RSA unifies identity and access management

RSA announced new solutions within its Identity and Access Management (IAM) suite designed to address security challenges that require new ways to manage and protect the …

Mobile device data visualization for field investigators

Cellebrite introduced UFED Link Analysis, a new product that allows field investigators to visualize key relationships between suspects and identify important behavior by …

iPhone 5 release brings out email scammers

Apple’s long awaited release of iPhone 5 has provided cyber crooks with a perfect opportunity to scam users. Even before yesterday’s official presentation of the …

Microsoft’s study into unsecure supply chains leads to botnet disruption

Microsoft’s Digital Crimes Unit has disrupted the functioning of yet another botnet by effecting a takedown of a domain which was also hosting over 500 different strains …

Blackhole 2.0 is out with new exploits and same price

A new version of BlackHole, one of the most popular exploit kits out there, has been made available by its creator, who has supposedly rewritten it from scratch. BlackHole 2.0 …

Don't miss

Cybersecurity news