Please turn on your JavaScript for this page to function normally.
Network anomaly detection appliance by IBM

According to the 2011 IBM X-Force Trend and Risk Report, adversaries ramped up social engineering attacks, and X-Force witnessed mobile exploits having increased by 19 percent …

Macs harbor both Mac and Windows malware

Have the predictions made yearly by many security firms finally come true? Will Mac users be forced to invest in a good antivirus solution? According to the latest numbers …

First portable malware intelligence system

ValidEdge has unveiled a real-time malware analysis engine built into a standard laptop, delivering the power to analyze up to 1000 malware samples per day in a fully …

Google raises bug bounty to $20,000

Google has announced that it will be updating the rules for its bug bounty program and will start handing out bigger amounts to the researchers participating in it. According …

Web application attack report from FireHost

Secure cloud hosting company, FireHost, has revealed details about type and origin of web attacks that it has blocked from causing harm to clients’ web applications and …

Fake warning about Olympic-themed scams carries malware

It’s three months to go until the start of the London Olympics 2012, and sports fans are searching for and buying tickets to the various events online. Unfortunately, …

Russian cybercrime market doubles in size

Russian cybercrime investigation and computer forensics company and LETA Group subsidiary Group-IB released a 28-page report prepared by analysts from its computer forensics …

BYOD is both an opportunity and a threat

A survey titled “What is your approach to BYOD – Love it? Hate it?” and conducted among 316 IT and security professionals set out to assess the opinions of …

Users worry about data security, but still trust social networks

Although the majority of people (71 percent) are worried about the amount of personal information held online, a significant proportion would still share confidential …

Enterprise encryption with near zero overhead

Vormetric announced Vormetric Encryption V5, which significantly reduces the cost and application impact of encryption by using software enhancements and hardware encryption …

Enhanced security awareness for tablet users

Cryptzone unveiled the latest release of NETconsent Compliance Suite, its policy management software. Recognising how difficult it is to raise IT security awareness amongst an …

Phishing and malware meet cheque fraud

Trusteer recently uncovered a scam in an underground forum that shows how data obtained through phishing and malware attacks can be used to make one of the oldest forms of …

Don't miss

Cybersecurity news