Managing firewalls in virtual environments
AlgoSec announced the ia solution for managing firewalls in virtual environments. AlgoSec Security Management Suite simplifies hypervisor-level firewall management by …
The risks of unauthorized access
HP unveiled new global research that reports increased threats to sensitive and confidential workplace data are created by a lack of control and oversight of privileged users, …
Chrome is the most secure browser, claims new study
Microsoft’s Internet Explorer does a better job protecting systems from attackers who already have gained some degree of access than Mozilla’s Firefox, and …
2,000 live typosquatted domains discovered
Customers of major high-street brands such as Argos, Debenhams, and John Lewis are falling victim to cybercriminals that target mistyped web addresses, a technique known as …
Spam campaign bypasses Gmail filters, employs Google Docs
Every now and then, online crooks and spammers use Google Docs to host phishing forms or documents with embedded malicious links. One such spam campaign is currently …
Premium SMS fraudulent apps target European users
European mobile phone users should be on the lookout for premium SMS toll fraud apps as a great number of them has been lately discovered on file sharing sites, third-party …
Pros losing confidence in hard tokens
Almost a quarter of organizations, 23%, have suffered a security breach as a result of identity fraud which was linked to a lost or stolen authentication device, according to …
Personal info of US law enforcement agents published following hack
The official website (Clearusa.org) of the Coalition of Law Enforcement and Retail has been attacked by a hacker that goes by the handle of “Exphin1ty” who claims …
SMS Privato Spy: Another piece of bogus software for sale
Every so often, a new piece of non-existent software gets advertised by scammers that are eager to part users with their hard earned cash. The latest one to be spotted is …
The value of securing Internet enabled devices
From the hottest new tablet to sleek smartphones and laptops, electronic devices are likely to be at the top of many consumers’ Christmas wish lists this year. …
IT departments have easiest access to sensitive data
CEOs of modern companies often lack access to their own sensitive data, according to Venafi. When asked who had the easiest access to their company’s most sensitive …
2012 network security trends
Looking back on 2011, FortiGuard Labs saw a number of landmark developments in the world of network security. Huge botnets such as DNS Changer and Coreflood were permanently …
Featured news
Sponsored
Don't miss
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
- “0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days