Security monitoring for BYOD environments
Lancope showcased its solution for securing bring-your-own-device (BYOD) environments based on the company’s flow-based monitoring technology. Unlike other BYOD security …
Breaches of large organizations are at a record high
The number of large organizations being hacked into is at a record high; the overall cost of security breaches to UK plcs is now billions of pounds a year, a new survey of 447 …
Dedicated appliances for protection against DDoS
Fortinet introduced the FortiDDoS product family for enterprises, Web hosting and cloud service providers. The new FortiDDoS-100A, FortiDDoS-200A and FortiDDoS-300A are …
Network anomaly detection appliance by IBM
According to the 2011 IBM X-Force Trend and Risk Report, adversaries ramped up social engineering attacks, and X-Force witnessed mobile exploits having increased by 19 percent …
Macs harbor both Mac and Windows malware
Have the predictions made yearly by many security firms finally come true? Will Mac users be forced to invest in a good antivirus solution? According to the latest numbers …
First portable malware intelligence system
ValidEdge has unveiled a real-time malware analysis engine built into a standard laptop, delivering the power to analyze up to 1000 malware samples per day in a fully …
Google raises bug bounty to $20,000
Google has announced that it will be updating the rules for its bug bounty program and will start handing out bigger amounts to the researchers participating in it. According …
Web application attack report from FireHost
Secure cloud hosting company, FireHost, has revealed details about type and origin of web attacks that it has blocked from causing harm to clients’ web applications and …
Fake warning about Olympic-themed scams carries malware
It’s three months to go until the start of the London Olympics 2012, and sports fans are searching for and buying tickets to the various events online. Unfortunately, …
Russian cybercrime market doubles in size
Russian cybercrime investigation and computer forensics company and LETA Group subsidiary Group-IB released a 28-page report prepared by analysts from its computer forensics …
BYOD is both an opportunity and a threat
A survey titled “What is your approach to BYOD – Love it? Hate it?” and conducted among 316 IT and security professionals set out to assess the opinions of …
Users worry about data security, but still trust social networks
Although the majority of people (71 percent) are worried about the amount of personal information held online, a significant proportion would still share confidential …
Featured news
Resources
Don't miss
- European police busts Ukraine scam call centers
- SoundCloud breached, hit by DoS attacks
- The messy data trails of telehealth are becoming a security nightmare
- What Cloudflare’s 2025 internet review says about attacks, outages, and traffic shifts
- Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)