Please turn on your JavaScript for this page to function normally.
Mobile device data visualization for field investigators

Cellebrite introduced UFED Link Analysis, a new product that allows field investigators to visualize key relationships between suspects and identify important behavior by …

iPhone 5 release brings out email scammers

Apple’s long awaited release of iPhone 5 has provided cyber crooks with a perfect opportunity to scam users. Even before yesterday’s official presentation of the …

Microsoft’s study into unsecure supply chains leads to botnet disruption

Microsoft’s Digital Crimes Unit has disrupted the functioning of yet another botnet by effecting a takedown of a domain which was also hosting over 500 different strains …

Blackhole 2.0 is out with new exploits and same price

A new version of BlackHole, one of the most popular exploit kits out there, has been made available by its creator, who has supposedly rewritten it from scratch. BlackHole 2.0 …

Five things that the private cloud is not

Ongoing hype around private cloud computing is creating misperceptions about private cloud, according to Gartner, Inc. To help reduce the hype and identify the real value of …

Cisco delivers new security solutions

Cisco introduced a set of security solutions designed to fortify data centers against the threats they face in moving toward more consolidated and virtualized environments, …

Wave Endpoint Monitor detects anomalous behavior

Wave Systems announced Wave Endpoint Monitor (WEM), a solution that detects malware by leveraging capabilities of an industry standard security chip onboard the PC. WEM …

Structured method to data breach analysis and response

Data breaches are growing in frequency and magnitude, and have a tremendous financial, legal, operational and reputational impact to the breached organization, whether …

Trend Micro expands consumer mobile portfolio

Trend Micro expanded its consumer mobile offerings to secure, enhance and simplify people’s mobile lives. The new release of Trend Micro Mobile Security Personal Edition …

Web security client for OS X

Perimeter E-Security announced their cloud-based SaaS Web Security solution now supports OS X. The solution allows organizations to enforce acceptable use policies, reduce …

Cloud-based content management apps for the life sciences industry

Veeva Systems announced Vault Enterprise, a cloud-based suite of content management applications developed specifically for the global life sciences industry. Now, life …

Botnet operators hide C&Cs in the Tor network

Over the years, botnet owners have tried out different tactics for keeping their C&C servers online, in contact with the zombie computers, and hidden from researchers and …

Don't miss

Cybersecurity news