Please turn on your JavaScript for this page to function normally.
German states say “federal trojan” used within legal boundaries

The reaction following CCC’s claims that a government-made “lawful interception” Trojan has abilities that exceed those allowed by the nation’s …

Enhanced automated malware analysis by RSA

RSA announced new capabilities for RSA NetWitness Spectrum, an analytical workbench for the identification, analysis and prioritization of malware-based threats to enterprise …

Fake virus warning from company IT department brings real malware

Emails purportedly coming from a company’s IT department has been spotted targeting users of various big companies and trying to make them download malware for the last …

A call for a new approach to security

RSA executives advised security professionals that the new fact of life for IT organizations is a state of persistent, dynamic, intelligent threats in which it is no longer a …

Don’t worry about zero-days, says Microsoft

Microsoft released its Security Intelligence Report volume 11 (SIRv11), which found that less than 1 percent of exploits in the first half of 2011 were against zero-day …

F-Secure launches Internet Security 2012

F-Secure launched Internet Security 2012, an improved version of its online safety offering. It is easy to use and the new Launch pad provides convenient access to all parts …

“I saw a real bad blog about you” Twitter phishing scam

Twitter has been warning users not to fall for the latest phishing scam that takes the form of a DM from someone you know warning you to check out a “real bad blog about …

SANS offers discount for London 2011 training event

Even with the tough economic conditions last year, over 400 students attended SANS London 2010 and that figure is likely to increase for 2011 as SANS unveils its largest ever …

Unified identity federation for cloud applications

SafeNet announced that its SafeWord 2008 strong authentication management platform, along with SafeNet Authentication Manager (SAM), now provides a seamless and extensible …

Best practices for reporting malware

Nonprofit anti-malware organization StopBadware released of its new Best Practices for Reporting Badware URLs, which prescribe specific steps for reporting different types of …

Consolidated security appliances for application service and SaaS providers

Fortinet announced three new consolidated security appliances for the mid-range market segment that includes medium size businesses, enterprise customers, application service …

Massive international identity theft operation shut down

111 individuals have been indicted in the largest identity theft takedown in U.S. history. The defendants, members of five organized forged credit card and identity theft …

Don't miss

Cybersecurity news