Please turn on your JavaScript for this page to function normally.
Romney defeats Gingrich in US spam primaries

Mitt Romney, the former Massachusetts governor who’s leading polls in the race to become the Republican Party’s nominee for the US presidency, is also the favorite …

Active mobile botnet enslaves thousands of Android devices

A trojanized Android application for configuring phone settings has been enslaving the devices of the customers of China’s two largest mobile carriers into a botnet …

Free online privacy tool

Abine released Do Not Track Plus (DNT+), a tool that makes it easy for anyone to see when they’re being tracked online and stop being profiled by social networks, large …

MasterCard and Silver Tail Systems combat online fraud

MasterCard and Silver Tail System announced a relationship that will enable merchants to differentiate fraudsters from legitimate consumers in real-time during the online …

Making Embedded Systems

Embedded systems control many devices in common use today, from digital watches and iPods to traffic lights and the systems controlling nuclear power plants. Since …

Top reasons for IT layoffs in 2011

Based on the data obtained with the help of a data leakage control system, and an in-depth analysis of work time usage by staff, the specialists of Falcongaze analytical …

The evolution of targeted attacks and exploit kits

There’s been a significant growth in cybercrime, via sophisticated targeted attacks and social media scams, as well as a rise in malicious email attachments, despite a …

Apple iWork passwords cracked

ElcomSoft can now recover passwords protecting Apple iWork documents. This makes Distributed Password Recovery the first tool to recover passwords for Numbers, Pages and …

ISO 27001 benefits: How to obtain management support

As with any other project, if you do not ensure enough money and human resources, your ISO 27001 project will fail. Therefore, the only way to get those is to get your …

Cybercriminals tailoring tactics for maximum appeal

GFI Software released its report on the most prevalent threat detections encountered during January. Last month saw malware attacks targeting a wide range of potential …

Web app security scanner Netsparker 2.1 released

Netsparker can crawl, attack and identify vulnerabilities in all custom web applications regardless of the platform and the technology it’s built on, just like an actual …

Building Resilient IP Networks

More companies are building networks with the intention of using them to conduct business. Because the network has become such a strategic business tool, its availability is …

Don't miss

Cybersecurity news