Scientists reveal new malware detection method
Scientists from NQ Mobile’s Mobile Security Research Center, in collaboration with North Carolina State University disclosed a new way to detect mobile threats without …
Online behavioral tracking often violates privacy practices
Keynote Systems announced the results of an in-depth analysis of online behavioral tracking on 269 Websites across four industries – News & Media, Financial …
User activity monitoring for Windows and OS X
SpectorSoft released SPECTOR 360 7.4, user activity monitoring software for Mac and Windows networks. The software provides visibility into and analysis of the digital …
Secunia PSI 3.0 released
Secunia announced the availability of Secunia PSI 3.0, a free computer security scanner which identifies software applications that are insecure and in need of security …
Fake e-ticket from Delta leads to multiple infections
Bogus emails supposedly coming from Delta Airlines and delivering an e-ticket in the attachment have recently been targeting users around the world: The message instructs the …
Cristiano Ronaldo is the most dangerous player in cyberspace
Increasingly, cybercriminals are exploiting the names of popular sports stars and celebrities to attract people to sites that actually conceal malicious software. Anyone …
ISO 27001 implementation: How to make it easier using ISO 9001
ISO 27001 and ISO 9001 may seem like quite different standards, but when you take a closer look at both, you can find a lot of similarities. They have the same …
Companies routinely share sensitive information via email
PhoneFactor announced a new survey data regarding the vulnerability of company email systems. The majority of respondents reported that highly sensitive information about …
Red Hat introduces open hybrid cloud solutions
Red Hat announced a set of solutions that the company plans to roll out in the coming months that are based on Red Hat products and technologies and are designed to enable …
Hack This: 24 Incredible Hackerspace Projects from the DIY Movement
Hack This is your passport to the world of hackerspaces: your invitation to share knowledge, master tools, work together and build amazing stuff. Twin Cities Maker co-founder …
Massive crime ring automates bank fraud, steals tens of millions
Two-factor authentication schemes have definitely been proven to be ineffectual as news of a massive global financial services fraud campaign that targeted well-moneyed …
Fake “confirm PayPal account” emails lead to phishing
An extremely legitimate looking email supposedly coming from PayPal has been hitting inboxes in the last few days, trying to trick customers of the popular e-payment giant to …
Featured news
Sponsored
Don't miss
- Browser backdoors: Securing the new frontline of shadow IT
- Key metrics for monitoring and improving ZTNA implementations
- Chrome, Edge users beset by malicious extensions that can’t be easily removed
- Unpatched MS Office flaw may leak NTLM hashes to attackers (CVE-2024-38200)
- Scout Suite: Open-source cloud security auditing tool