Compromised online accounts for sale
The recently unearthed website of a service specializing in selling access to compromised email and social networking accounts of Russian and Ukrainian users offers a …
Trend Micro Mobile Security 8.0 released
Trend Micro launched Trend Micro Mobile Security (TMMS) 8.0 which enhances the enforcement of existing password and encryption policies as well as provides more granular …
Spear phishing targets one in two organizations
Proofpoint announced findings from a survey of security IT enterprise decision makers, about email and information security trends. Key findings include: Spear phishing is an …
Encryption for Microsoft Office 365
CipherCloud unveiled CipherCloud for Office 365, a cloud encryption gateway that transparently encrypts all email message, calendar, and contact data stored in …
When employees leave so does your data
One in three (32%) employees have taken or forwarded confidential information out of the office on more than one occasion, according to Iron Mountain. When people change jobs, …
D-Link releases Cloud Camera 5000 with pan and tilt
D-Link announced its D-Link Cloud Camera 5000 (DCS-5222L), which offers a round-the-clock surveillance solution with 720p HD recording, smooth pan/tilt and digital zoom …
Metasploit Pro increases vulnerability management efficiency
Rapid7 introduced the means to increase vulnerability management efficiency by leveraging intelligence from its penetration testing solution, Metasploit Pro, to validate …
Real-time fraud prevention with PhoneID Contact
TeleSign announced the newest product in the PhoneID suite, which helps online businesses block fraud by delivering name and address details based on a phone number. PhoneID …
Spam for Dropbox users raises speculations about breach
European Dropbox users have been inundated with spam advertising gambling websites, prompting speculations about a possible breach of the company’s systems. The news …
Energy grids are prime attack targets
The electrical power grid is the backbone on which everything else depends. A cybercriminal could debilitate a major city by a single targeted attack on the energy grid and …
Android malware is booming
Trend Micro’s January prediction that some 11,000 pieces of Android malware will be detected by June this year has proved completely inaccurate, as the number of …
Fake Facebook photo tag notification leads to malware
Beware of fake Facebook emails telling you that you’ve been tagged in a photo, as you could easily end up infected with malware. The emails do visually resemble messages …
Featured news
Resources
Don't miss
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)
- GitPhish: Open-source GitHub device code flow security assessment tool
- Healthcare CISOs must secure more than what’s regulated