Threats and protection issues of cloud data
Eighty-two percent of organizations already transfer, or plan to transfer, sensitive or confidential data into the cloud environment according to a global study of 4,000 …
Quantum cryptography theory has a proven security defect
Researchers at Tamagawa University, Quantum ICT Research Institute, announced today that they had proved the incompleteness and limit of the security theory in quantum key …
Employees targeted with faked emails from payroll services firms
Administrators at companies that outsourced payroll management to outside firms have recently been heavily targeted with malicious emails supposedly coming from those very …
GFI MailArchiver 2012 tackles email storage and data leakage
GFI Software announced the availability of GFI MailArchiver 2012 that offers new reporting capabilities to guard against data leakage of sensitive information, such as social …
Malicious Olympic 2012 Android apps spotted
The Olympic Games currently underway in London have proven to be one of the best lures for cyber scammers and other cyber crooks: we’ve had Olympic-themed spam emails …
New version of Palamida’s scanning solution for open source projects
Palamida recently announced Enterprise Edition 6, the latest edition of its open source intellectual property and vulnerability risk management product. The new version adds a …
The underground economy of social networks
In a new study, Barracuda Labs analyzed a random sampling of more than 70,000 fake Twitter accounts that are being used to sell fake Twitter followers. They also analyzed some …
WatchGuard XTM 5 Series network security appliances released
WatchGuard released WatchGuard XTM 5 Series network security appliances. Appliance packet filtering increased nearly 40 percent, gateway antivirus is 190 percent faster, IPS …
USB with AES 256-bit hardware encryption
Enova Technology announced the Enigma module, a USB encryption solution designed to provide real-time full disk encryption for any USB mass storage class (MSC) drive. Key …
Critical Watch releases countermeasure recommendation engine
Critical Watch launched its ACI Recommendation Engine which consolidates multiple disparate data points into a unified view of risks. It’s designed to help close the gap …
“Microsoft support” scammers still cold calling users
The old “Microsoft support center” scam is back. It is likely that it never went away, but lately the scammers have increased their efforts, targeting users again …
80% of “Olympic” domains are scammy
Popular global events such as the Olympic Games are a boon to cyber crooks, as they know for sure that a huge amount of people will be turning to the Internet to search for …
Featured news
Resources
Don't miss
- Portmaster: Open-source application firewall
- Google fixes Android vulnerabilities “under targeted exploitation” (CVE-2025-48633, CVE-2025-48572)
- How a noisy ransomware intrusion exposed a long-term espionage foothold
- Creative cybersecurity strategies for resource-constrained institutions
- Product showcase: UserLock IAM for Active Directory