A surveillance system that can anticipate trouble
Two researchers from the Psychology Department of the Carnegie Mellon University have managed to create a video surveillance system that not only follows human activity, but …
“Free Windows 8” offer leads to email hijacking
Hot on the heels of the recent release of Windows 8 and a generic spam campaign supposedly delivering a Windows license comes another attempt to take advantage of unwary …
Rugged Android device with secure communication
Cummings Engineering, in partnership with Ascent Rugged Mobile, is launching SAIFE Defender, a commercial rugged Android device with secure digital communications. SAIFE …
F-Secure keeps your apps, plugins and OS up-to-date
F-Secure has introduced Software Updater which offers patch management as a business security feature. Over 80% of the top 10 malware detected by F-Secure Labs are targeted …
Mobility management for Windows Phone 8
AirWatch unveils device and application management support for Windows Phone 8 devices. “With the introduction of the Nokia Lumia 920 and Nokia Lumia 820, partnerships …
Privacy-invading module found in thousands of apps on Google Play
An advertising module embedded into over 7,000 “free” fake versions of legitimate Android apps that can be found on Google Play is actively harvesting a ton of …
Coverity Security Library released on GitHub
Coverity announced the creation of the Coverity Security Library, an open source project available through GitHub and Maven to help developers easily fix cross-site scripting …
Intel joins SAFECode
The Software Assurance Forum for Excellence in Code (SAFECode), a non-profit organization exclusively dedicated to increasing trust in information and communications …
Open source NAC system PacketFence 3.6 released
PacketFence is a fully supported, trusted, free and open source network access control (NAC) system. Among the features provided by PacketFence, there are: BYOD (Bring Your …
Red Hat Enterprise Linux 6 achieves top security certification
Red Hat Enterprise Linux 6, including the KVM hypervisor, has been awarded the Common Criteria Certification at Evaluation Assurance Level (EAL) 4+ – the highest level …
Malware authors turn to simpler detection evasion techniques
Given the huge amount of malware variants created each year, it is understandable that malware researchers count on automated threat analysis systems to single them out for …
Malicious “Your Photos” email from fake LinkedIn users
If you receive an email seemingly coming from a LinkedIn user, asking you to open an attachment in order to see “your photos” – don’t do it! Opening …