Please turn on your JavaScript for this page to function normally.
Cisco collaborates with Microsoft for data center virtualization

Cisco is collaborating with Microsoft to deliver data center virtualization solutions designed to provide improved scalability and operational control of Microsoft Windows …

Microsoft re-releases botched security update

Microsoft has re-released a security update for Windows XP and Server 2003 after it has realized that the initial one – released last Tuesday in order to add six more …

Mobile threat vectors shift enterprise security strategies

Attacks on smartphones are becoming more common, and according to McAfee Labs, new malware targeting Android devices jumped 76 percent in the last quarter. The need to secure …

AVG Business Edition 2012 released

AVG Technologies announced AVG Business Edition 2012, a security software solution for SMBs. In a nutshell, AVG Business Edition 2012: Delivers more – with respect to …

Secure remote file access for Mac and PC

iTwin is a USB device that allows two online computers to share military-grade encrypted data from anywhere in the world. Comprising two identical parts, iTwin can be …

DigiNotar files for bankruptcy

After having its SSL and EVSSL certificates deemed untrustworthy by the most popular browsers, VASCO announced that DigiNotar, filed a voluntary bankruptcy petition and was …

ShareSafe: Avoid malicious links on Facebook

ShareSafe is a free Facebook beta application developed by F-Secure that keeps you safe from spam and malicious links in your news feed and wall. It’s also easy to scan …

Skype users targeted with calls spreading fake AV

Showing considerable resourcefulness in their attempt to trick Internet users, fake AV peddlers have begun targeting Skype users with an unexpected call. “Attention: …

Bots troll hacker forums to discover data breaches

When talking about bots, the first thing that comes to mind is often a bad one – i.e. how cyber crooks misuse the technology to bilk Internet users out of information or …

iManager multiple vulnerabilities

Gjoko Krstic has discovered multiple vulnerabilities in iManager, which can be exploited by malicious people to conduct cross-site scripting attacks, manipulate certain data, …

Cybercriminals find new ways to disguise spam

It used to be that malicious attachments came in emails with erotic photos of girls who “want to meet you”, or “scandalous photos” of celebrities. Now, …

Securing virtual environments and reducing malware risk

Rapid7 announced that the new version of its vulnerability management solution, Nexpose 5.0, will address the complex security challenges presented by the wide scale adoption …

Don't miss

Cybersecurity news