Who has access to your network and data?
GFI Software released guidelines for businesses ahead of the end of year holiday period, traditionally a time when many office-based businesses close for the festive season, …
56 alleged members of card fraud ring arrested in Europe
56 suspected members of a major network of payment card fraudsters (38 in Bulgaria, 17 in Italy and 1 in the Netherlands) have been arrested in a coordinated raid across …
14,000 Indian websites hacked in 2012
It has been reported that over 14,000 Indian websites have been hacked by cyber criminals this year, an increase of nearly 57 percent from 2009. Barry Shteiman, Senior …
Fluke Networks increases BYOD device visibility
Fluke Networks announced a new BYOD Classification capability that reduces the cost and time needed to optimize and secure a wireless network for authorized and unauthorized …
Blue Coat acquires Crossbeam Systems
Blue Coat Systems has entered into an agreement to acquire Crossbeam Systems. The acquisition is expected to close on December 31, 2012. “Our service provider and …
Carberp-in-the-Mobile found on Google Play
Everybody knows (or should know) that downloading apps from third party online markets is dangerous, but even official markets such as Google Play can’t be considered …
Payment processor for scareware cybercrime ring jailed
A Swedish credit card payment processor was sentenced today to 48 months in prison for his role in an international cybercrime ring that netted $71 million by infecting …
Facebook users targeted with bogus Walmart gift card offer
Christmas season should be a happy and relaxed time, but it often isn’t – especially when the money is tight. There are feasts to be planned and presents to be …
Phishers lure users in with fake Facebook security app
A recently discovered phishing scam aimed at Facebook users proves that even the best intentions can sometimes lead to terrible results, Symantec warns. The phishers set up a …
Ransomware demands survey completion instead of cash
Ransomware has replaced fake AV as the most high-profile and annoying malware targeting computer users around the world, and the approach is always the same: the owners of the …
Looking to the future: Security predictions for 2013
The door is closing on 2012, and it’s time to look ahead to next year. As you round out your 2013 business and IT plans, cybercriminals are resolving to implement …
Reinvent your security approach
Tasked with ensuring the success of business-changing IT initiatives from mobile and BYOD to virtualization and cloud services, IT security is finding that existing security …
Featured news
Resources
Don't miss
- Hackers used Cisco zero-day to plant rootkits on network switches (CVE-2025-20352)
- Microsoft revokes 200 certs used to sign malicious Teams installers
- A new approach to blockchain spam: Local reputation over global rules
- SAP zero-day wake-up call: Why ERP systems need a unified defense
- “Perfect” Adobe Experience Manager vulnerability is being exploited (CVE-2025-54253)