Most prevalent threat detections of the holiday season
In November, GFI threat researchers encountered email threats disguised as notices from American Express, DHL and UPS as the holiday season kicked into full gear, as well as a …
Multipurpose Necurs Trojan infects over 83,000 computers
The polivalent Necurs malware family has been wreaking havoc in November by infecting over 83,000 unique computers – and that are only the ones detected by …
Beware of Bitcoin miner posing as Trend Micro AV
Malware almost always comes in disguise, but some malware peddlers try to do a better job than others. Trend Micro researchers have recently uncovered a piece of malware that …
Proprietary platforms to cause complexity in 2013
Citrix predicts that the rise of consumerisation and the Bring-Your-Own (BYO) phenomenon will force IT departments to focus on the challenge of apps and data governance. 2012 …
Reflecting on 2012: Cyberwar, next generation firewalls and compliance
Historically security products have been developed either in response to, or in anticipation of, major shifts in enterprise computing – or at least that’s been my …
Motives behind IT budget spend and 2013 cloud trends
A global survey of 550 CIOs, IT Directors, and senior IT managers has confirmed motives behind their IT budget spend in 2012, while revealing the rate of cloud adoption in …
Wi-Fi operating system ArrayOS gets new features
Wick Hill announced a new release of the ArrayOS operating system for Xirrus Wireless Arrays. Xirrus AOS 6.3 provides an advanced Wi-Fi operating system for optimizing the …
DataMotion unveils SecureMail Gateway
DataMotion announced updated its SecureMail Gateway, an intelligent monitoring solution that uses policy-based encryption and Exact Matching functionality to prevent data …
Damballa updates its cyber threat solution
Damballa unveiled Damballa Failsafe 5.1, a cyber threat solution for corporate networks. It includes features that reduce the workload of over-tasked incident response teams, …
Week in review: Inadequate AV solutions, Eurograbber attacks, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news and articles: Security experts debate moving critical infrastructure online Paul Simmonds, …
Metasploit Pro 4.5 released
Rapid7 released a new version of Metasploit Pro, which introduces advanced capabilities to simulate social engineering attacks. With Metasploit 4.5, security professionals can …
U.K. hacker convicted for taking part in Anonymous attacks
22-year-old Christopher Weatherhead from Northampton, U.K., has been convicted on Thursday on one count of conspiracy to impair the operation of computers for his involvement …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits