HP unveils new family of next-generation firewall appliances
HP unveiled its new family of HP TippingPoint Next-Generation Firewall (NGFW) appliances to further protect customers from threats introduced by mobile and cloud computing. …
Week in review: Undetectable hardware Trojans, Chinese hackers for hire, and latest IE 0-day insight
Here’s an overview of some of last week’s most interesting news and articles: NSA impersonated Google in MitM attacks After all the recent revelations about the …
RSA advises customers to stop using NSA-influenced encryption algorithm
In the wake of the disclosure that the NSA has influenced NIST to adopt an encryption standard that includes one random bit generator with a weakness known only to the …
Clever email campaign delivers deadly ransomware to orgs
A new type of ransomware that obviously concentrates on targeting organizations instead of home users has been spotted by Emsisoft researchers. Dubbed CryptoLocker, the …
Belgacom was breached by Britain’s GCHQ
Earlier this week, the primarily state owned Belgacom – the largest telecom in Belgium, with customers such as the European Commission, Council and Parliament – …
Websites of energy sector companies compromised in watering hole attack
The websites of nearly a dozen energy sector companies have been compromised to serve as so-called “watering holes”, where visitors would be served with malware or …
Eight arrested over £1.3 million theft from Barclays bank
Eight men have been arrested by the Metropolitan Police’s Central e-Crime Unit (PCeU) in connection with a £1.3 million theft by a gang who stole the money by …
ENISA report on top cyber threats
ENISA presented its list of top cyber threats, as a first “taste” of its interim Threat Landscape 2013 report. The study analyses 50 reports, and identifies an …
HP helps government agencies protect information
HP announced HP Continuous Monitoring, designed to identify and report IT security vulnerabilities in real time. The solution provides U.S. government agencies with an …
DeviceLock now prevents data leakage from Macs
DeviceLock announced DeviceLock Endpoint DLP Suite 7.3 that delivers essential device control capabilities for corporate endpoints with OS X Lion and OS X Mountain Lion …
Acronis advances secure BYOD with mobilEcho
Acronis launched mobilEcho 4.5, a mobile file management (MFM) solution that now includes in-app editing tools for Microsoft Office documents and military-grade, certified …
Researchers discover ties between TDSS and ZeroAccess rootkit families
A lot has been said and written about the long-lasting TDSS (or TDL) and the considerably newer ZeroAccess (or Sirefef) rootkits, and the similarities between the two have …
Featured news
Resources
Don't miss
- Microsoft 365 users targeted in device code phishing attacks
- More than half of public vulnerabilities bypass leading WAFs
- The soft underbelly of space isn’t in orbit, it’s on the ground
- Privacy risks sit inside the ads that fill your social media feed
- Should AI access be treated as a civil right across generations?