RSA Security Analytics leverages big data
RSA released RSA Security Analytics – a transformational security monitoring and investigative solution designed to help organizations defend their digital assets …
Users trust the cloud with important data
New research from Rackspace shows that Brits may be trusting the cloud as never before with up to £24 billion worth of digital assets stored remotely. According to the …
Malware controls 620,000 phones, sends costly messages
A new discovered malware is potentially one of the most costly viruses yet discovered. Uncovered by NQ Mobile, the “Bill Shocker” (a.expense.Extension.a) virus has …
FedEx-themed malicious emails bombarding inboxes
FedEx customers are constantly targeted with malicious emails supposedly coming from the global courier delivery service, but since the start of the year, FedEx-themed spam …
FBI arrests man accused of coercing women to expose themselves on Internet
A man accused of hacking into hundreds of Facebook, Skype and email accounts and extorting women into showing him their naked bodies was arrested today on federal computer …
SaaS mobile device, application and data management solution
AppSense released MobileNow, a SaaS based mobile device, application and data management solution designed for Enterprise and Mid-Market organizations that bridges …
Practical steps to minimize data privacy threats
Google comes across 9,500 new malicious websites each day and responds by sending notifications to webmasters. Nevertheless, these websites are just one of the many dangers …
Oil and gas infrastructure cybersecurity spending to increase
As a highly critical sector, the oil and gas infrastructure should be one of the most secure, both physically and digitally. This is not the case. A multi-billion dollar …
The effectiveness of bug bounty programs
Veracode released an infographic that examines the success of bug bounty programs. The past decade has witnessed major growth in demand for bug hunters, with online giants …
DDoS attack sizes plateau, complex multi-vector attacks on the rise
Arbor Networks released its 8th Annual Worldwide Infrastructure Security Report (WISR) offering a rare view into the most critical security challenges facing today’s …
Bogus Windows 8 activators collect users’ private info
Despite Windows 8 sales being not as good as Microsoft hoped, there is considerable interest in the new OS version. Still, not everybody wants to pay to try it out, and …
Internet-facing printers remain a huge risk
Despite repeated warnings about office and home devices being accessible from the Internet when there is no good reason for them to be, every now and then someone gets the …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)