Websense introduces URL categories and social web controls
Websense introduced URL categories and social web controls that enable IT managers to better regulate specific employee actions, reduce exposure to dangerous data-stealing …
Fake DHL delivery notification carries info-stealer Trojan
Malware peddlers have once again started a spam run that consists of emails purportedly sent by DHL. They spoofed the sender information, making it look like the email was …
Cisco WebEx Player WRF file processing vulnerabilities
Multiple buffer overflow vulnerabilities exist in the Cisco WebEx Recording Format (WRF) player. In some cases, exploitation of the vulnerabilities could allow a remote …
Data breaches cause lasting reputation damage
Reports of data breaches affecting some of today’s largest companies continue to grab the headlines of prominent news outlets nationwide. The damage experienced by a …
Replacement for legacy two-factor authentication
Yubico announced the availability of YubiRADIUS, a free, virtual appliance server that delivers secure remote access, SSL-VPN and VPN connectivity. Built on open source …
Proactive security for private clouds and virtual environments
Cyber-Ark Software extended its auto-discovery capabilities for proactively detecting privileged accounts within virtualized environments. This scalable capability to support …
Manage all mobile devices from one destination
Lookout Mobile Security offers security protection and find-my-phone functionality to all tablet devices, including all Honeycomb and Ice Cream Sandwich Android devices, in …
Citrix delivers apps to any user on any device
Citrix announced the next stage of its strategy for Citrix CloudGateway, the unified service broker that aggregates, controls and delivers Windows, web, SaaS and mobile apps …
Naked Emma Watson video leads to malware
Fake videos or pictures of naked international celebrities are often used as lures in schemes to propagate malware. The latest of these videos purportedly features popular …
180,000 Swedes at risk following password-hacking spree
Registered members of around 60 popular Swedish websites are in danger of having their stolen login credentials misused by cyber crooks in the wake of the biggest ever …
Spam gang uses own URL shorteners
URL shortening services are deservedly popular with Internet users, but unfortunately they are loved by cyber crooks and spammers as well. While regular users appreciate …
Tsunami, a new backdoor for Mac OS X
Malware authors have taken an old piece of malware developed for Linux and have modified it to attack the Mac OS X platform, warns ESET. The OS X malware has been named …
Featured news
Sponsored
Don't miss
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
- “0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days