Complex malware and BYOD drive mobile security
Mobile malware has advanced to a new level of sophistication as smart devices continue to gain ground. The number of unique mobile threats grew by 261% in just two quarters. …
Airlock launches secure cloud hosting
Airlock launched its Secure Cloud Platform which offers enterprise-level security features like intrusion detection, hardware and web application firewalls, DDoS mitigation …
Week in review: Massive DDoS attack targets Spamhaus, Amazon S3 buckets leaking, and cyber espionage deterrence
Here’s an overview of some of last week’s most interesting news, podcasts, videos and articles: What do users look for in a security solution? Users are aware of …
Spammers bypass spam filters with Google Translate links
Google Translate is the latest trick in spammers’ arsenal for bypassing email spam filters, warn Barracuda Labs researchers. Spam filters work by evaluating (among other …
US starts gradually removing Chinese IT equipment from federal systems
A new law concerning funds given to U.S. federal agencies has been signed by President Obama, and it says that Departments of Commerce and Justice, NASA, and the National …
Microsoft releases privacy and security guide for policy makers
Microsoft released the third volume of its popular policymaker booklet, Building Global Trust Online, which includes considerations and guidance for a number of new …
OpenStack security brief
This video from Shmoocon 2013 is a break down of security concerns relating to OpenStack cloud software. OpenStack is an open source IaaS solution compatible with Amazon EC2 / …
8 in 10 companies suffered web-borne attacks
The vast majority of organizations that allow employees to freely access the Web are experiencing high rates of malware threats, including phishing attacks, spyware, …
Worldwide IT spending to reach $3.8 trillion in 2013
Worldwide IT spending is projected to total $3.8 trillion in 2013, a 4.1 percent increase from 2012 spending of $3.6 trillion, according to the latest forecast by Gartner. …
Backdoor Trojan picks up commands from Evernote account
Trend Micro researchers have recently analyzed a backdoor Trojan that contacts an unusual command and control center – an Evernote account. The backdoor – dubbed …
Global credit card fraud network dismantled
44 members of a global credit card fraud network have been arrested in a joint operation coordinated by the Romanian Cybercrime Unit in Romania, in close cooperation with …
A look at how consumers safeguard their devices
While consumers who have lost a smartphone or had one stolen in the past are significantly more likely to be taking basic protective measures with their current device, nearly …
Featured news
Resources
Don't miss
- The messy data trails of telehealth are becoming a security nightmare
- What Cloudflare’s 2025 internet review says about attacks, outages, and traffic shifts
- Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
- Kali Linux 2025.4: New tools and “quality-of-life” improvements
- How researchers are teaching AI agents to ask for permission the right way