Cybercriminals use social engineering to extend lifecycle of malware
Android smartphone users remain a lucrative target as the platform currently has 59 percent global market share and is on track to stay the most shipped mobile operating …
Hidden security risks of top mobile apps
Appthority cast a spotlight on the hidden behaviors of the top free mobile apps. The report reveals the security issues raised by the BYOD movement, app market fragmentation …
What will the workplace of the future look like?
IT consumerization is dependent on an open-minded approach by organizations, and most likely to succeed with specific, pre-defined parameters, according to Dell and Intel. …
Location tracking becomes more attractive
In a GFI Software survey of more than 1,000 U.S. respondents, 12% say they would use location tracking to monitor their spouse’s whereabouts, while 31% of respondents …
CryptoAuditor: Privileged user access auditing
SSH Communications Security launched CryptoAuditor at the Black Hat USA 2012 conference. It helps prevent data loss across encrypted secure shell, RDP and SFTP traffic with …
Novell makes BYOD enterprise ready
Novell announced the availability of ZENworks Mobile Management, which addresses the pain points device administrators and managers face today, including BYOD (bring your own …
Safe C++: How to avoid common mistakes
It’s easy to make lots of programming mistakes in C++. In fact, any program over a few hundred lines is likely to contain bugs. With this book, you’ll learn about …
Apple releases OS X Mountain Lion
Apple announced that OS X Mountain Lion, the ninth major release of its desktop operating system, is available as a download from the Mac App Store, available as an upgrade …
VirusTotal starts sandbox-testing, shares behavioral information
Developer Emiliano Martinez has recently confirmed what many users of VirusTotal have already noticed: that the online file scanning service has added behavioral information …
Scientists develop tool for improving app security
A team led by Harvard computer scientists, including two undergraduate students, has developed a new tool that could lead to increased security and enhanced performance for …
New Mac backdoor Trojan spotted
A new Mac Trojan – dubbed Crisis or Morcut – has been spotted but, luckily, not in the wild. Security firms Intego and Sophos have picked up samples from Virus …
Sharp rise in SQL injections
FireHost revealed the latest statistical analysis of attacks successfully blocked by its servers. During the period of April to June 2012, web applications, databases and …
Featured news
Sponsored
Don't miss
- Scammers dupe chemical company into wiring $60 million
- Australian gold mining company hit with ransomware
- Browser backdoors: Securing the new frontline of shadow IT
- Key metrics for monitoring and improving ZTNA implementations
- Chrome, Edge users beset by malicious extensions that can’t be easily removed