Biggest security threat for 2012? Privacy violations
Cyber-espionage, along with privacy violations and social networking attacks facilitated by the increased use of mobile and tablet devices, will be the source of increased …
How to spot fake Android apps
In the wake of the news that Google has again been removing Premium SMS fraudulent apps masquerading as popular games from its the official Android Market, TrendMicro’s …
The risks of online shopping
More people than ever are using their personally owned smartphones to send and receive e-mails, browse the Internet, shop online and visit social media sites – as well …
Key security threats in the coming year
The widespread adoption of mobile devices, proliferation of applications and growth of cloud computing are helping accelerate business innovation and social benefits. However, …
GlobalSign reports CA infrastructure wasn’t compromised
When the self-styled ComodoHacker – who also claimed responsibility for the DigiNotar hack – boasted that he had access to GlobalSign’s “entire …
Silent updating for Internet Explorer
Microsoft announced that in 2012 Internet Explorer will be updated “silently” to its newest possible version. This new silent update will eliminate the pop-up …
The rise of social media abuse and mobile malware
IID released its list of the top security trends from 2011. Some specific trends that IID saw emerge over the past year include the extended enterprise coming under assault, …
Challenges facing critical infrastructure operators
While critical infrastructure operators hold great responsibility for managing security, compliance and operations, many struggle to balance the resources required for each of …
Security behavior and buying trends for 2012
PCI data security standards may be a hot topic, but a recent survey by Gartner found that 18 percent of respondents admitted to not being PCI-compliant, even though the survey …
Users go to extreme measures for Internet access
Seven out of 10 young employees frequently ignore IT policies, and one in four is a victim of identity theft before the age of 30, according to a global study from Cisco. The …
Security-hardened key management
Thales announced keyAuthority 3.0, combining high availability and hardened security to deliver a field-proven high assurance key manager. keyAuthority enables organizations …
Syncplicity launches Security and Compliance Console
With Syncplicity, users get their own secure Virtual Private Cloud where they use the applications, files and folders they are used to. With the File changes, no matter where …
Don't miss
- Commix: Open-source OS command injection exploitation tool
- Review: The Chief AI Officer’s Handbook
- How QR code attacks work and how to protect yourself
- MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)
- OSPS Baseline: Practical security best practices for open source software projects