Tracking anomalies from multiple sources across the organization
Zettaset unveiled its new Security Data Warehouse (SDW), which enables users to track up to petabytes of business and security data for anomalies and other potentially …
First fingerprint-enabled NFC payment transaction executed
NXP Semiconductors, AuthenTec and DeviceFidelity announced that they are jointly developing reference designs that enable highly secure mobile payments via Android-based …
The Sun readers’ personal information leaked
News International has sent out emails to thousands of its online readers warning them that their personal information has been published by a hacker that goes by the handle …
“Assume you are compromised,” say top security officers
RSA released a new report that takes an in-depth look at the seismic shift in the cyber threat landscape, as enterprises are increasingly targeted for corporate espionage and …
Twitter users bombarded with invitations to assorted scams
In the last couple of days, Twitter users have been inundated with a variety of scams. They are likely the direct consequence of the recent phishing attempts posing as fake …
Mobile banking security for Android
Webroot has announced it is extending mobile security applications to its partners in banking in order to protect their customers who use tablets and smartphones to conduct …
Alleged LulzSec hacker released on bail
Jake Davis – the teenager from Shetland Islands that was arrested last week in connection to LulzSec and Anonymous attacks and is believed to be the infamous …
Mac Trojan disguised as Flash Player initiates redirection attack
There’s a new Mac OS X Trojan in town, and it masquerades as a FlashPlayer.pkg installer, warns F-Secure. “Once installed, the trojan adds entries to the hosts …
Granular access to encrypted data in the cloud
Newline Software announced the release of OPTIC, Online Privacy Technology In the Cloud. The solution allows developers to securely query, write, and read encrypted data to …
Spear-phishing and crimeware assembling marked second half of 2010
The Anti-Phishing Working Group (APWG) reports that the development of crimeware surged in the half-year period ending in December, 2010 with one data contributor registering …
Metasploit module for imitating Cisco devices
SecureState announced the release of the CDP tool, an additional module for the Metasploit Framework, this time for forging Cisco Discovery Protocol frames. The Cisco …
A unique malware file is created every half-second
Sophos has released its Mid-Year 2011 Security Threat Report, which reveals that since the beginning of 2011, the company has identified an average of 150,000 malware samples …
Featured news
Resources
Don't miss
- Siemens Teamcenter vulnerability could allow account takeover (CVE-2025-23363)
- Is Agentic AI too smart for your own good?
- Hottest cybersecurity open-source tools of the month: February 2025
- What cybersecurity pros read for fun
- Is your email or password among the 240+ million compromised by infostealers?