Tips for network administrators as mobile device usage increases
The increase in mobile device has resulted in network challenges for businesses of all types and sizes. According to the Monetate Q1 2013 Ecommerce Quarterly, tablets have …
Viewfinity launches a new application control solution
Viewfinity announced the availability of the Viewfinity Application Control solution, a homogeneous software solution that includes application whitelisting, managing trusted …
McAfee ePolicy Orchestrator exploitation tool
US-CERT’s latest advisory focuses on an exploit tool for McAfee ePolicy Orchestrator. The tool targets two vulnerabilities found in ePO versions 4.6.5 and earlier. In …
INTERPOL and Trend Micro to collaborate against cybercrime
Trend Micro is to collaborate with INTERPOL, the world police body, to support global law enforcement programmes to combat cybercrime. The announcement is the latest in …
Microsoft helped NSA get around its encryption
It has been a bad month for US Internet giants, but things got even worse for Microsoft as the latest batch of NSA documents leaked by Edward Snowden revealed that the company …
Unusual Facebook spam campaign delivers malicious Macros
A bizarre spam / malware delivery campaign is currently targeting Facebook users. It starts with the offer to see a video of a girl performing a salacious act – and this …
Infographic: Is your information safe?
ID Experts released an infographic that provides a snapshot of identity theft and data breach over the last decade. Click on the image below to see the large version. Data …
Free malware removal tool gets new features
The fourth generation of Emsisoft Emergency Kit is now available. It now boasts an improved cleaning function for the removal of malicious software. And at the same time it …
EMC releases array of new products
EMC announced new hardware and software products that enable customers to deploy new Protection Storage Architectures that address today’s and tomorrow’s data …
Bug bounties are cheaper than hiring full-time bug hunters
Software companies that have instituted bug bounties are on the right track, a recently published report by researchers of the University of California, Berkeley computer …
Blue Coat Internet monitoring devices (mis)used in Iran, Syria, Sudan
Even though US sanctions should have made it impossible, filtering and Internet monitoring devices by US-based Blue Coat Systems can be found on many computer networks in …
Bluebox releases free scanner for Android “master key” bug
Bluebox Security, the mobile security startup that’s “working to save the world from information thievery”, has made a name for itself by finding and …
Featured news
Resources
Don't miss
- SolarWinds fixes critical Web Help Desk RCE vulnerabilities, upgrade ASAP!
- Open-source malware zeroes in on developer environments
- Hottest cybersecurity open-source tools of the month: January 2026
- A practical take on cyber resilience for CISOs
- OPNsense 26.1 brings updates to open-source firewall management