Rapid7 updates vulnerability management solution
Rapid7 announced that the new capabilities of its vulnerability management solution, Nexpose, simplify the challenge of IT security risk management. Nexpose 5.5 introduces new …
Ultra-secure memory sticks with anti-malware features
Kingston Digital has partnered with ESET and ClevX. The combination extends ClevX DriveSecurity powered by ESET’s proactive portable anti-malware technology to …
Panda Cloud Antivirus 2.1 released
Panda Security launched Panda Cloud Antivirus 2.1. The product incorporates new anti-exploit technologies, in both its free and pro editions, which detect and neutralize …
Former Anonymous spokesman indicted for sharing stolen card data
After having been arrested last September and having been detained in custody ever since, 31-year-old Barrett Brown has finally been indicted for possessing and transmitting …
Hackers encrypt medical centre’s patient data, ask for ransom
Russian hackers have apparently managed to break into a server where an Australian medical centre keeps its patients’ records, encrypt the data, and are now asking for …
Team GhostShell leaks 1.6M account details
Hacker collective Team GhostShell, which has recently specialized in massive data leaks, has done it again and made public 1.6 million account details allegedly stolen from …
200,000 new malicious programs detected every day
Kaspersky Lab released its annual Kaspersky Security Bulletin, which provides the overall malware and cyber-threat statistics for 2012. The report revealed significant growth …
Most prevalent threat detections of the holiday season
In November, GFI threat researchers encountered email threats disguised as notices from American Express, DHL and UPS as the holiday season kicked into full gear, as well as a …
Multipurpose Necurs Trojan infects over 83,000 computers
The polivalent Necurs malware family has been wreaking havoc in November by infecting over 83,000 unique computers – and that are only the ones detected by …
Beware of Bitcoin miner posing as Trend Micro AV
Malware almost always comes in disguise, but some malware peddlers try to do a better job than others. Trend Micro researchers have recently uncovered a piece of malware that …
Proprietary platforms to cause complexity in 2013
Citrix predicts that the rise of consumerisation and the Bring-Your-Own (BYO) phenomenon will force IT departments to focus on the challenge of apps and data governance. 2012 …
Reflecting on 2012: Cyberwar, next generation firewalls and compliance
Historically security products have been developed either in response to, or in anticipation of, major shifts in enterprise computing – or at least that’s been my …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)