Content-related threats cause significant data loss
Content-layer threats – those where an attacker leverages malicious software in what the user believes is harmless content – are posing increasing risks for …
Android security: Protection of Java and native apps
Arxan Technologies enhanced its Mobile Application Protection Suite to include multi-layered, end-to-end protection for Android applications. Given the open source nature of …
Cloud computing as key to improved data protection
More than half (55%) of U.S. organizations expect their use of the cloud to increase as part of their business continuity strategy over the next year, according to CA. …
Kickstarter bug granted access to unlaunched projects
A bug in the private application programming interface (API) of Kickstarter, the popular crowd funding website for creative projects, has exposed details about 70,000 projects …
Avira “fixes” PC-crippling update bug
On Monday, Avira issued a faulty Service Pack for all of its products running on 32-bit versions of Windows, which resulted in massive problems for users as the …
Ads on Wikipedia can point to malware infection
Every now and then, Wikipedia’s popularity and brand are misused by malware peddlers, typosquatters and scammers. But the fact that the Wikipedia project is funded …
IT is embracing BYOD
IT is accepting, and in some cases embracing, “bring your own device” (BYOD) as a reality in the enterprise. A new Cisco study shows some of the quantifiable …
Banking Trojan masquerading as Chrome installer
Brazilian and Peruvian users looking to install Google’s Chrome browser are in grave danger of downloading information-stealing malware instead. “We recently found …
Facial recognition technology for user authentication
DigitalPersona announced the latest release of its enterprise software which builds upon its existing support for a wide variety of user authentication methods by including …
Manage Windows event logs with Event Log Explorer
FSPro Labs released Event Log Explorer 4, designed to view, monitor and analyze events recorded in Security, System, Application and other logs of Microsoft Windows operating …
Intel strengthens security of its Core vPro platform
Intel announced the availability of its 3rd Generation Intel Core vPro processor-based platforms for business and intelligent systems. New capabilities embed security at every …
Online travel most vulnerable to email attacks
Agari released its first TrustIndex, a quarterly measurement that applies Agari’s big data insights to score email attack vulnerability and email trust by industry. …