Please turn on your JavaScript for this page to function normally.
Critical vulnerabilities in popular DDoS toolkit exposed

Prolexic Technologies exposed weaknesses in the command and control (C&C) architecture of the Dirt Jumper DDoS Toolkit family that could neutralize would-be attackers. …

Organizations lack protocols to protect data in the cloud

While sixty-two percent of survey respondents are leveraging the cloud and/or virtualization, only 33 percent of these organizations test data recovery plans regularly to …

Huge jump in number of fines for data breaches

The Information Commissioner’s Office (ICO) has revealed a huge increase in the number of penalties handed out for organisations in breach of the Data Protection Act. …

Cyber-Ark enhances security of files in-transit

Cyber-Ark Software announced version 7 of its Sensitive Information Management Suite to support secure file exchange environments. The suite isolates sensitive data sent over …

Microsoft releases nine comprehensive security bulletins

Microsoft released nine comprehensive security bulletins as part of its regular update cycle. At the top of the Microsoft list is another MSCOMCTL related bug. Last patched in …

Website analyzes and rates convoluted Terms of Service

When signing up for an online service, users are required to read and agree to the presented Terms of Service (ToS). But these terms often go on and on, and are written in …

Who is using the commercial cyberespionage tool FinFisher?

Malware development has long stopped being the exclusive domain of individuals and groups looking for strictly fame or money. As years passed and everybody and everything went …

BackTrack 5 R3 released

BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to …

Imation updates line of hardware encrypted USB hard drives

Imation announced the expansion of its secure USB hard drive line with capacities of up to 1 terabyte (TB), optional biometric fingerprint authentication, and a set of options …

Facebook deceived developers and users with Verified Apps program

The privacy settlement that the US Federal Trade Commission and Facebook agreed on last November has been finalized on Friday and, unlike Google earlier that week, Facebook …

BYOD reality: Missing mobile device usage policies

Gone are the days when employees only used a company-issued phone or laptop for work. Today, employees bring personal smartphones and tablets to the office and often have …

Citadel Trojan targets airport employees with VPN attack

Trusteer have recently discovered a sophisticated Man in the Browser (MitB) enterprise attack that targets VPN users at a major international airport hub. Using the Citadel …

Don't miss

Cybersecurity news