Surge in mobile exploits and shell command injection attacks
IBM released the results of its X-Force 2011 Trend and Risk Report which shows surprising improvements in several areas of Internet security such as a reduction in application …
Video surveillance on Cisco Unified Computing System
Cisco announced that its Video Surveillance software is available on the Unified Computing System (Cisco UCS) platform, now in use by more than 11,000 customers. Cisco …
A peek in the world of vulnerability sellers
As you probably already know, this year’s edition of Pwn2Own wasn’t the only hacking contest at the CanSecWest conference held earlier this month. Pwn2Own rules …
Georbot information stealing Trojan uncovered
ESET revealed its analysis of Georbot, an information stealing Trojan and botnet spreading in the country of Georgia. Earlier this year ESET’s global research team …
Google educates Gmail users on spam
Educating computer users about security is something that every online service should consider doing, and I’m glad to see that Google has started explaining why its …
Mousetrap Trojan steals money by chain reaction
Catalin Cosoi, Chief Security Researcher at Bitdefender warns of a new Trojan that robs your bank account. The new Mousetrap campaign starts with a Java applet that has been …
Mobile forensics and cloud security at SANS Secure Europe 2012
SANS Secure Europe 2012, one of the region’s largest infosec training events will be returning to Amsterdam from 5th to 19th of May with its largest roster of courses …
Duqu developers still active, researchers say
Duqu, the infamous remote access Trojan first discovered in November 2011 and thought to have been created by the same authors as Stuxnet, is still getting modified by its …
Risk across the phases of application security
A new Ponemon Institute study surveyed more than 800 IT Security and Development professionals from enterprise organizations to understand the perceptions both groups have …
Tips for backups in virtual environments
With the rate of virtualized servers being added to IT environments, organizations are facing new challenges in how to adequately protect data and ensure its recoverability …
GSM cracking revelations are profound
Commenting on news reports that an Indian company has revealed it can tumble and clone the credentials of mobile phone SIM cards over the airwaves – apparently because …
Network intrusion detection for Amazon Web Services
Alert Logic announced the availability of Alert Logic Threat Manager and ActiveWatch for Amazon Web Services (AWS). AWS customers using Amazon EC2 interested in an added layer …
Featured news
Sponsored
Don't miss
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
- “0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days