100% of enterprises reported cyber attacks
Attacks are becoming more difficult to defend against and are expensive to mitigate, with traditional safeguards falling short, according to F5 Networks. With both …
Scammers sending out bogus job offers
Cyber scammers do not hesitate using every scrap of information there is on the Internet in order to gain users’ trust and misuse it for their malicious purposes. Also, …
Block cipher encryption effectively hides banking Trojan
Brazilian malware peddlers have turned to encrypting banking Trojans with block ciphers, effectively bypassing most AV software. Kaspersky Lab’s Dmitry Bestuzhev says …
Entry VPN client for Windows
NCP engineering announced Secure Entry Client 9.3, its entry VPN client for Windows which supports mobile broadband in Windows 7 and Internet Key Exchange version 2 (IKEv2). …
Integrate security and risk management: TOGAF and SABSA
There is a new free guide that enables enterprise and security architects to integrate security and risk management approaches into enterprise-level architectures. Endorsed …
How does cell phone money laundering work?
In Russia, most cell phone SIM cards are prepaid. One of the major Russian operators offers a legal service that allows anyone to transfer the prepaid amount of money from a …
New techniques for detecting hardware Trojans
Most Internet users know about the existence of software Trojans, but that of hardware ones is less known. They consist of integrated circuits that have been modified by …
Cybercriminals exploiting user inexperience
Noteworthy threats in October 2011 included the return of a rogue web browser, a phony hacking tool for Gmail account password recovery and malware disguised as advertisements …
Norman releases endpoint protection system
Norman released Endpoint Protection 9, which stops all kinds of malware threats including viruses, worms, trojans, spyware, adware, bots, zero-day threats and rootkits. …
FBI arrests six for DNS hijacking scam worth $14 million
Charges against six Estonian nationals and one Russian national for engaging in a massive and sophisticated Internet fraud scheme that infected with malware more than four …
Oracle Solaris 11: The first cloud OS
Oracle today released Solaris 11, the first Cloud OS. Oracle Solaris 11 is designed to meet the security, performance and scalability requirements of cloud-based deployments …
Bitdefender prevents scams on Twitter
Bitdefender is adding a tool to its arsenal to prevent scams on Twitter. Safego has emerged successful from beta testing by Twitter users and will be incorporated into …
Featured news
Resources
Don't miss
- Microsoft introduces protection against email bombing
- Sudo local privilege escalation vulnerabilities fixed (CVE-2025-32462, CVE-2025-32463)
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it