Fake Facebook “Pages you might like” emails deliver malware
Fake Facebook emails urging users to review some Pages they might like are hitting inboxes around the world, warns ThreatTrack. Sporting “Hi [name], here are some Pages …
GitHub adds two-factor authentication option
GitHub is the latest web-based service to add a 2-factor authentication feature to make the users’ login process more secure. “When logging in to GitHub, after …
Barracuda launches Barracuda Firewall X100 and X101
Barracuda Networks announced the new Barracuda Firewall X100 and X101, next-generation firewalls designed for small businesses. Barracuda also released new firmware, version …
FireEye introduces real time, continuous protection platform
FireEye announced Oculus, a global, real time, continuous protection platform. Oculus is comprised of three components: Threat prevention platform – The FireEye Threat …
Head of INTERPOL on the key to protecting cyberspace
With the physical and virtual worlds becoming increasingly interconnected, INTERPOL Secretary General Ronald K. Noble told the Underground Economy 2013 conference at the world …
Email data protection through a mobile app
ZixCorp announced commercial availability of ZixOne, a mobile email app that solves the key IT challenge created by the BYOD trend. ZixOne manages access to corporate email …
Neohapsis and Arxan protect sensitive apps
Neohapsis and Arxan announced a partnership to offer enhanced tamper-resistance and self-defense built into a comprehensive application security strategy. According to recent …
Online backup for mobile devices: Key factors to consider
Most technology users keep personal information (contacts, calendars, documents, photos, etc.) on their mobile devices. That information isn’t protected if the mobile is …
Hand of Thief Linux Trojan fails to work as promised
RSA researchers have recently spotted a banking Trojan targeting Linux systems being sold online by a cybercrime team based in Russia. Dubbed Hand of Thief by its creator(s), …
AT&T’s massive call detail record database accessible to DEA agents
Since 2007, AT&T employees have been working side by side with US Drug Enforcement Administration and local law enforcement agents, helping them access electronic call …
Arbor Networks acquires Packetloop
Arbor Networks has acquired privately held Packetloop, an innovator and provider of Security Analytics. Terms of the deal were not disclosed. Arbor plans to invest in and …
Persistent adversaries can identify Tor users
Using the Tor network will not you grant perfect anonymity – in fact, a group of researchers from the US Naval Research Laboratory and Georgetown University say that …
Featured news
Resources
Don't miss
- Open-source AI pentesting tools are getting uncomfortably good
- What boards need to hear about cyber risk, and what they don’t
- Security work keeps expanding, even with AI in the mix
- Ivanti provides temporary patches for actively exploited EPMM zero-day (CVE-2026-1281)
- Google disrupts proxy network used by 550+ threat groups