Optical transaction signing device limits ebanking fraud
SafeNet announced the eToken 3500, an electronic signing and strong authentication token-based device that will enable financial services organizations to achieve risk …
Hackers breach T-Mobile Web server, leak staff data
A Web server hosting part of T-Mobile’s official website has apparently been compromised by TeaMp0isoN, a hacker collective associated with Anonymous, and some of the …
Intelligent information governance from Symantec
In order to enable organizations to better protect their information, establish retention policies and streamline their eDiscovery process, Symantec announced its plans for …
Fortinet releases three new appliances
Fortinet introduced three new members to its FortiWeb Web application firewall product family – the FortiWeb-4000C, FortiWeb-3000C FSX and FortiWeb-400C. The new product …
Zappos hacked, info of 24+ million customers may be compromised
Zappos, the shoe-and-apparel-selling division of Amazon, has been hit by cyber attackers and has had one of its servers compromised and information from it exfiltrated. The …
First sub-$50 cloud router
D-Link introduced the first sub-$50 Wi-Fi router with advanced cloud services – the new D-Link Cloud Router (DIR-605L). In addition to bringing cloud-enabled devices to …
Google Docs hosted phishing schemes abound
Google Docs is a helpful office suite and data storage service that allows users to collaborate on documents with ease but, unfortunately, it is also a very useful tool for …
San Francisco City College systems infected for over a decade
Computers and servers of the City College of San Francisco have been discovered to be infected with a myriad of computer viruses and information-stealing malware, and some of …
Week in review: Currency rounding attacks, Trustworthy Computing Initiative anniversary, and how to foil targeted attacks
Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: Most unusual laptop recovery stories From the good, the bad, and …
Reactions from the security community to the Trustworthy Computing Initiative
This week, Microsoft is celebrating 10 years of its Trustworthy Computing Initiative (TwC). One of the most well-known outcomes of Trustworthy Computing is the Microsoft …
10 years of Microsoft’s Trustworthy Computing Initiative
Ten years ago this week, during a time when security problems were threatening trust in software products, Bill Gates sent an email to all Microsoft full-time employees …
Chinese using malware to attack US DoD smart card security
AlienVault found evidence of Chinese-originated attacks against the US government agencies including the US Department of Defense (DoD), which use a new strain of the Sykipot …
Featured news
Resources
Don't miss
- Vulnerable firmware for Gigabyte motherboards could allow bootkit installation
- AsyncRAT evolves as ESET tracks its most popular malware forks
- Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech
- Securing vehicles as they become platforms for code and data
- How service providers can turn cybersecurity into a scalable MRR engine