Invisible authentication for mobile applications
RSA announced the release of software developer kits (SDKs) designed for mobile application developers to seamlessly integrate strong one-time password (OTP) or risk-based …
Cyber criminals outsourcing money-collecting to mobile operators
Cybercrime has come a long way since it was mostly a digital form of vandalism. It has developed into a criminal business operated for financial gain and is now worth …
McAfee shoots for next generation IPS
McAfee announced its network security framework which integrates advanced network intrusion prevention with essential next-generation controls. The solution addresses a need …
Vulnerability management for Web applications
Core Security announced Core WebVerify Web application security software that provides organizations with actionable intelligence and analysis on indisputably critical …
October 2011 Patch Tuesday fixes 23 vulnerabilities
In today’s Patch Tuesday, Microsoft delivers 8 security bulletins (two rated “critical,” six “important”) that address 23 vulnerabilities …
German states say “federal trojan” used within legal boundaries
The reaction following CCC’s claims that a government-made “lawful interception” Trojan has abilities that exceed those allowed by the nation’s …
Enhanced automated malware analysis by RSA
RSA announced new capabilities for RSA NetWitness Spectrum, an analytical workbench for the identification, analysis and prioritization of malware-based threats to enterprise …
Fake virus warning from company IT department brings real malware
Emails purportedly coming from a company’s IT department has been spotted targeting users of various big companies and trying to make them download malware for the last …
A call for a new approach to security
RSA executives advised security professionals that the new fact of life for IT organizations is a state of persistent, dynamic, intelligent threats in which it is no longer a …
Don’t worry about zero-days, says Microsoft
Microsoft released its Security Intelligence Report volume 11 (SIRv11), which found that less than 1 percent of exploits in the first half of 2011 were against zero-day …
F-Secure launches Internet Security 2012
F-Secure launched Internet Security 2012, an improved version of its online safety offering. It is easy to use and the new Launch pad provides convenient access to all parts …
“I saw a real bad blog about you” Twitter phishing scam
Twitter has been warning users not to fall for the latest phishing scam that takes the form of a DM from someone you know warning you to check out a “real bad blog about …
Featured news
Resources
Don't miss
- Vulnerable firmware for Gigabyte motherboards could allow bootkit installation
- AsyncRAT evolves as ESET tracks its most popular malware forks
- Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech
- Securing vehicles as they become platforms for code and data
- How service providers can turn cybersecurity into a scalable MRR engine