QR codes used to infect Android users with malware
Most people already know what QR codes are: a new type of “barcode” that can be used for a variety of purposes – tracking, ticketing, labeling of products, …
Microsoft security solutions say Chrome is malware
Among the questions and comments on the Google Chrome support forums this morning are several complaints about Microsoft Security Essentials detecting Chrome as a Zbot variant …
XenServer 6 released
Citrix Systems released XenServer 6. As a key component of the Citrix cloud computing and virtualisation strategy, XenServer 6 brings new optimizations and improved …
Nearly 5 million military health care files stolen
Sensitive data about nearly 5 million patients has been compromised following the theft of backup tapes from an electronic healthcare app used in the military health system, …
Critical vulnerabilities triple in 2011
Adoption of mobile devices such as smartphones and tablets in the enterprise, including the “Bring Your Own Device” approach, which allows personal devices to …
Smartphone users choose convenience over security
In a revealing survey of smartphone and tablet users, the majority polled admit to not password protecting their mobile devices despite keeping them logged in to sensitive …
Content protection for Android devices
Elliptic Technologies expanded its DTCP-IP content protection offering to include support for Android used in a myriad of consumer devices, including DLNA enabled smartphones …
Mail-borne polymorphic malware soars
Approximately 72% of all email-borne malware in September could be characterized as aggressive strains of generic polymorphic malware, says Symantec in its September 2011 …
25% of tested Google Chrome extensions allow data theft
27 of a 100 tested Google Chrome extensions have been found vulnerable to data (passwords, history, etc.) extraction attacks though specially crafted malicious websites or by …
Clever phisher almost tricks PhishTank
PhishTank is an anti-phishing site run by the OpenDNS team and offers the possibility of submitting suspected phishing sites for community-based review. In short, other users …
First enterprise mobile DLP solution
Zenprise announced its Mobile Enterprise Security Framework including the mobile DLP solution for managing and securing the growing number of personally owned devices entering …
Amazon introduces Silk, a cloud-accelerated web browser
Amazon Silk introduces a “split browser” architecture that accelerates the power of the mobile device hardware by using the computing speed and power of the Amazon …
Featured news
Sponsored
Don't miss
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
- “0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days