IT security budgets set by U.S. federal agencies
A new IDC Government Insights report examines IT security budgets set by each U.S. federal agency and reveals how much each organization actually spends on security-focused …
Yet another Trojan based on Spitmo source code surfaces
Even though nearly all new mobile malware in Q3 was aimed at Android phones, users with mobile devices running other mobile platforms are far from safe. F-Secure researchers …
Why SMBs are attractive to hackers
A Symantec global survey of nearly 2,000 SMBs showed that 50% did not consider themselves an attack target. However, looking at today’s threat landscape, this is clearly …
Secure practices for online shopping
As we prepare for Cyber Monday and a holiday season of increased online shopping, NCSA advises that everyone take a moment to practice safe cyber behaviors. These simple steps …
Week in review: Apple OS X sandbox hole, hiding messages in VoIP packets and U.S. water utility attack
Here’s an overview of some of last week’s most interesting news, podcasts, interviews and reviews Apple OS X sandbox hole allows bypassing of restrictions …
Hackers destroy pump in U.S. water utility attack
Hackers attacking SCADA systems and wreaking havoc in a nation’s critical infrastructure has become a justified concern for all countries. But, setting aside Iran and …
Cybercriminals to turn mobile phones into ATMs
With all of the crazy 2011 security breaches, exploits and notorious hacks, what can we expect for 2012? Researchers of the Websense Security Labs provide their top …
Most popular prohibited IT activities in the workplace
In spite of the fact that 74% of the interviewed IT professionals have already misused the company’s IT system, and could have lost their job, if a video recording could …
Backdoor Trojan pushed via versatile Facebook campaign
Thanks to its social nature, Facebook is one of the preferred tools of cyber crooks looking to scam users and peddle malware. Microsoft recently spotted a considerably …
Tips for secure mobile payments
With the increased use of mobile devices to pay for goods and services, traditional wallets with cash and credit cards could one day be obsolete. A new ISACA white paper …
Create a Wi-Fi hotspot anywhere
TP-LINK announced two new Portable Wireless N Routers, designed to provide high-speed Internet access anywhere you go. Both routers are ideal for connecting tablet computers, …
Solutions for inspecting and securing SSL traffic
Fidelis Security Systems announced the SSL Decoder within Fidelis XPS, which provides the ability to assess the authenticity of an SSL certificate. They also introduced the …
Featured news
Sponsored
Don't miss
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
- “0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days