Cybercrime goes mobile
Corporate espionage has never been so easy. See how a simple app can transform your smartphone into an espionage tool in the hands of criminals, able to record your …
Malware detection for Nessus vulnerability scanner
Tenable announced new malicious process detection capabilities on Windows computers for the Nessus vulnerability scanner. This new functionality complements and extends AV …
Juniper Networks enhances its Mykonos Web Security software
Juniper Networks announced major platform enhancements to its Mykonos Web Security software. The new release provides 30 new features and enhancements that strengthen …
Advanced Internet Protocols, Services, and Applications
Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions …
Olympics fans targeted with lottery scam
An email purportedly coming from the promotion manager of the London 2012 Olympics has been hitting inboxes, trying to scam recipients into sending personal information and …
Romanian hackers arrested for hitting government websites
Twelve individuals have been arrested across Romania for having allegedly compromised and defaced 29 websites of Romanian public institutions, and having stolen and leaked …
DNS-changing Trojan leads to phishing banking sites
Latin American Internet users are constantly attacked by cyber crooks who aim to get their online banking credentials in order to perpetrate identity theft and banking fraud. …
UFED Touch: Field-ready mobile forensics solution
Cellebrite launched UFED Touch, a solution for investigators to extract and decode digital evidence from mobile devices including smartphones, legacy phones, portable GPSs and …
17% of the world’s PCs are unprotected
Lack of consumer PC protection is a global problem. In a study that analyzed data from voluntary scans from an average of 27-28 million computers per month, McAfee researchers …
Security posture management from FireMon
FireMon announced Security Manager 6.0, a security policy and posture management solution that integrates risk analysis with configuration management, enforcement and auditing …
(IN)SECURE Magazine issue 34 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 34 has been released today. Table of contents: …
WikiLeaks founder Assange loses extradition appeal
WikiLeaks founder Julian Assange has lost his final extradition appeal as the Supreme Court in London decided that the Swedish Prosecuting Authority had the right to issue the …
Featured news
Resources
Don't miss
- March 2025 Patch Tuesday forecast: A return to normalcy
- Hetty: Open-source HTTP toolkit for security research
- How to safely dispose of old tech without leaving a security risk
- Who’s in your digital house? The truth about third-party access
- Can AI-powered gamified simulations help cybersecurity teams keep up?