Please turn on your JavaScript for this page to function normally.
Free web service identifies Internet abuse

Zscaler released IPAbuseCheck, free web service which will allow them to query a dynamic ThreatLabZ database to identify whether any of their endpoint clients and IP addresses …

Customizable cloud service with hybrid options

Contegix announced an expansion to MiraCloud, its cloud computing platform. It will offer a tiered cloud hosting model that includes convenience class, business class and …

Security testing to become part of education in Germany

Codenomicon and Brandenburg University of Applied Sciences (FH Brandenburg) announced a cooperation agreement to help educate German IT professionals. Codenomicon’s …

Security for virtualized environments

Bitdefender announced the commercial availability of an integrated security solution for VMware vShield 5 virtualised datacenters. Security for Virtualized Environments …

Federal Trojan has more capabilities than previously thought

Ten days ago, the Chaos Computer Club made public a set of worrisome discoveries made by their analysis of the “lawful interception” Trojan used by German law …

Mac Trojan disrupts automatic updating of XProtect

A variant of the recently discovered Flashback Trojan for Mac OS X has acquired the capability to disrupt the automatic updating of XProtect, the operating system’s …

U.S. DHS expects Anonymous to attack infrastructure

Anonymous is eyeing industrial control systems for future attacks, says the U.S. Department of Homeland Security, but its members have yet to demonstrate a capability to …

Duqu: The next tale in the Stuxnet files

Stuxnet was possibly the most complex attack of this decade, and we expected that similar attacks would appear in the near future. One thing for sure is that the Stuxnet team …

Cisco expands data center networking portfolio

As Internet traffic volumes increase at exponential rates (by 2013 it’s predicted that there will be 56 exabytes crossing the internet per month) the data centers that …

How to make a cheap mobile malware jail

Analyzing mobile malware without spreading it further can be very difficult to achieve, especially when one wants the malware to behave as it would in the wild. Unlike …

McAfee detects kernel-mode malware

McAfee announced Deep Defender, which is capable of detecting nearly all kernel-mode malware. This level of security is possible with McAfee DeepSAFE technology because its …

Shinken: IT system and application monitoring

Shinken can monitor all IT from systems to end user applications. In case of a failure, it can alert the operation engineers so they can repair it. It has the same …

Don't miss

Cybersecurity news