Please turn on your JavaScript for this page to function normally.
New P2P botnet soon available for sale

The development of a new botnet that will rely on a decentralized architecture based on P2P technology is nearing completion and will soon be offered for sale for a sum of …

Flash vulnerability exploited to deliver malware

Attackers are once again exploiting the public’s tendency for not keeping its software updated and its ongoing interest about Iran and its nuclear program to infect …

IT security in 2020

Predicting how the world will look like a hundred years from now might seem to many like an exercise in futility given the rapid pace of technological development, but a …

Big data solution for network traffic

Bivio NetFalcon is the first big data solution for network traffic that performs real-time analytics on long-term, large scale records of network communications. Currently …

Major phishing contributors and enablers

Agari announced the first Annual Sumo Awards to dishonor phishing’s biggest contributors and enablers. The Sumo Awards categories identify why phish emails succeed, …

The decline of trust in social networking platforms

The UK is increasingly well connected, however it is seeing a wave of distrust across all major communications channels (mobile, fixed and social networking) due to fears …

Network-wide anomaly detection and packet forensics

Endace launched OSm 5.0, the latest software release for their range of accurate high speed network monitoring and recording systems. OSm 5.0 offers: Real time indexing of …

Most companies blame employees for data breaches

Employee negligence or maliciousness is the root cause of many data breaches, according to the Ponemon Institute. Over 78 percent of respondents blame employee behaviors, both …

Windows file protection with instant recovery

Condusiv Technologies launched Undelete 10, real time data protection and instant data recovery. The Server, Professional and Client editions of Undelete let you see the …

The CERT Guide to Insider Threats

Since 2001, the CERT Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than …

Visa pressures banks into closing spammers’ accounts

When computer science professor Stefan Savage and his team of researchers unveiled their analysis of the spam monetization model last year, they described 15 steps required …

Programmer hacks GitHub to prove a point

Russian programmer Egor Homakov has recently chosen a questionable tactic to prove the danger that a Ruby on Rails public key form update vulnerability poses to systems based …

Don't miss

Cybersecurity news