Please turn on your JavaScript for this page to function normally.
Phishing attacks rise year over year

Phishing attacks in Q1 2011 increased significantly compared to Q1 2010, according to IID. Criminals utilized phishing scams 12 percent more from January to March 2011 than …

HP Intelligent Management Center multiple vulnerabilities

Multiple vulnerabilities have been reported in HP Intelligent Management Center (IMC), which can be exploited by malicious people to compromise a vulnerable system, according …

Free credit and identity theft protection service

TrustedID launched IDSafe, a free consumer credit and identity theft protection service to provide core coverage at absolutely no cost. IDSafe provides consumers a free credit …

WatchGuard introduces next-generation firewall

WatchGuard unveiled its most powerful security appliance, the XTM 2050. This next-generation firewall (NGFW) providessecurity for large organizations and data centres that …

Security needs to be unified, simplified and proactive

IT security powerhouse Check Point is on a mission to make the management of security products unified and simplified, and nowhere has that message been more clear than at its …

Explosive financial malware targets Windows

Trusteer identified Sunspot, a little known Windows malware platform that has been in circulation for some time, but was never previously recognized for its financial fraud …

Protect, share and sync data remotely

Trend Micro announced SafeSync for Business to help even the smallest companies securely save, manage and access their digital files from anywhere at any time, while …

Visa unveils new payments solutions

Visa today announced the next generation of payments solutions that include a secure cross-channel digital wallet and a range of customized mobile payments services. The …

Facebook apps found giving access to user accounts to third parties

A discovery that really should not surprise anyone has been made yesterday by Symantec – it turns out that due to to a flaw in the authentication schemes used before the …

BackTrack 5 released

BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to …

Exponent CMS multiple vulnerabilities

Multiple vulnerabilities have been discovered in Exponent CMS, which can be exploited by malicious people to conduct cross-site request forgery attacks and disclose sensitive …

Majority not prepared for IPv6 transition

88% of business networks were not fully ready for a change to IPv6, with two thirds (66.1%) saying their networks are only 0-20% ready, despite the fact that the last blocks …

Don't miss

Cybersecurity news