Please turn on your JavaScript for this page to function normally.
2011: Year of the hack

In a year that IT security experts have labeled the “Year of the Hack,” Bit9’s endpoint survey of 765 IT executives revealed that Advanced Persistent Threat …

Security risks with 10Gb/s networks

A new survey shows that senior networking, operations and security professionals in telecommunications, online services, retail, manufacturing and healthcare have serious …

SDK for universal 2D and 3D object recognition

Neurotechnology announced SentiSight 3.0, a Software Development Kit (SDK) for universal object recognition. The object recognition algorithms now enable an even broader range …

WebSurgery: Suite for security testing of web applications

WebSurgery is a suite of tools for security testing of web applications. It was designed for security auditors to help them with the web application planning and exploitation. …

Many parents unaware if cyberbullying is an issue

While 89 percent of parents said they talk to their children about proper Internet safety, 40 percent do not know if cyberbullying is an issue at their child’s school, …

vOperations Suite 4: Clarity for cloud operations

VKernel released vOperations Suite 4, designed to provide operational clarity for cloud operators and enterprise data centers. This release introduces full Hyper-V …

Google servers as a DDoS tool

Google’s servers can be used by cyber attackers to launch DDoS attacks, claims R00T_ATI, a penetration tester for Italian security consulting firm AIR Sicurezza. He …

Hurricane Irene scams hit Facebook

As predicted, Hurricane Irene-themed scams have begun spreading on Facebook. The one spotted by Trend Micro fraud analyst Karla Agregado lures users in by offering a chilling …

Morto worm spreads via RDP, brute-forces Administrator accounts

There’s a new worm in town and it’s the first one that spreads by taking advantage of the Remote Desktop Protocol (RDP). “Once a machine gets infected, the …

Prototype for first virtualized ATM

For nearly 20 years, onboard computing technology has been at the core of the ATM. But, Diebold is leveraging virtualization technology to introduce a prototype for the …

Fake Facebook friend request, now with hidden iFrame

A slight variation of last week’s Facebook friend request spam email campaign has been spotted targeting the social network’s users, and this one employs a …

Google search results much cleaner than in 2010

It used to be that among the first ten pages of search results for popular terms, up to 90 percent of the offered links would take the users to a malicious page serving …

Don't miss

Cybersecurity news