New powerful bot spreads by email
PandaLabs reported the presence of a powerful new bot called Ainslot.L. This malware is designed to log user activities, download additional malware and take control of …
Analyze mobile apps for malware threats
Trend Micro announced Mobile App Reputation, a technology that can automatically identify, analyze and rate mobile applications for issues that could include malware, …
Cloudify cloud application platform
GigaSpaces Technologies announced Cloudify, a cloud application platform that enables organizations to easily on-board and manage any application, on any cloud, with zero code …
Imation secures mobile data, identity and workspaces
Imation announced its unified Secure Data, Identity and Mobile Workspace product set, which brings together a combination of encrypted USB storage devices and media, …
Cloud-based threat monitoring and response service
FishNet Security launched ThreatDetect, a cloud-based threat monitoring and response service, that allows organizations to proactively respond to emerging threats, meet …
Premium rate phone firms heavily fined for typosquatting
PhonepayPlus, the regulatory body for all premium rate phone-paid services in the UK, has ordered two Amsterdam-based companies to pay a fine of 100,000 pounds each and to …
Thwarting attacks with genetically-inspired computer configuration systems
In the seemingly unending search for computer security solutions that are both reactive and proactive, researchers have occasionally turned to other sciences for ideas. In …
Social mobile apps found storing users’ contacts without permission
A week ago, app developer Arun Thampi made public his discovery that Path – a popular iOS app that allows users to keep a journal of their everyday life and share it …
What is Gatekeeper in OS X Mountain Lion
The next version of OS X called Mountain Lion will be available this summer. Among the many new features, it will come with Gatekeeper that will help prevent users from …
Malicious sites increase 240%
In 2011, the most significant evolution in the threat landscape was the use of malware networks, or malnets, to launch highly dynamic Web-based attacks, according to Blue Coat …
Nessus 5.0 vulnerability scanner released
Tenable Network Security announced Nessus 5.0, a vulnerability and configuration assessment solution for enterprises and security professionals. Nessus 5.0 delivers introduces …
Trend Micro secures PlayStation Vita gamers
Trend Micro extended its collaboration with Sony and is now offering two web security services – “Trend Micro Kids Safety” and “Trend Micro Web …
Featured news
Sponsored
Don't miss
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
- “0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days