Mobile phones expose businesses to massive risks
Organizations are failing to respond to the culture of employees using their own mobile devices for work and are opening up their systems to security risks. These are the …
Malware disguised as new Instagram Android app
Instagram, the popular free photo sharing app for iOS devices, is now available for download for Android users on Google Play and Instagram’s website. Unfortunately, a …
Portable encrypted Linux computing environment
SPYRUS announced a new version of Secure Pocket Drive that allows end users to build and distribute their own secure bootable Linux OS image. In addition to offering secure …
Oracle fixes 88 security vulnerabilities
Oracle’s Critical Patch Update for April 2012 fixes 88 security vulnerabilities across the product line. The amount of fixes isn’t really a big concern; it’s …
Tenable enhances Nessus Perimeter Service
Tenable Network Security announced the newest version of its Nessus Perimeter Service which extends the power of its vulnerability scanner to help businesses protect payment …
Switching to the Mac: The Missing Manual, Lion Edition
There’s never been a better time to switch to Mac OS X and David Pogue’s newly released Switching to the Mac: The Missing Manual, Lion Edition can help you do it. …
Active fake AV spam campaigns hit Twitter
Two distinct malicious spam campaigns are currently targeting Twitter users and taking them to compromised sites serving rogue AV and scareware software, warns GFI. The …
Bank accounts of 3 million Iranians compromised
A former manager of an electronic banking clearance and automated payments system in Iran got tired of waiting for banks to fix a security vulnerability that put their …
Apple enhances Apple ID account security
iOS device owners whose Apple ID account may have triggered a flag with Apple’s security team have been asked to set up three new security questions and a backup email …
Bogus “Account limit exceeded” emails targeting Yahoo users
Fake Yahoo email notifications are hitting inboxes and urging users to verify their account because it has “exceeded its limit”, Hoax-Slayer warns. The message is …
Use iPads and iPhones securely on the job
MokaFive, whose software is driving the use and acceptance of Macs in the enterprise, is now doing the same for the iPad and iPhone. The new MokaFive for iOS unites work and …
Behind the scenes of the cleanest ISP in the world
The malware and botnet problem has been around for quite a while, and definitive solutions for it are still eluding the Internet and mobile communication industry, as well as …
Featured news
Resources
Don't miss
- Why we must go beyond tooling and CVEs to illuminate security blind spots
- Making security and development co-owners of DevSecOps
- Review: Passwork 7.0, self-hosted password manager for business
- What a mature OT security program looks like in practice
- Machine unlearning gets a practical privacy upgrade