Please turn on your JavaScript for this page to function normally.
Web-based stealth attacks on network security will dominate 2011

Viruses will become more subtle and even harder to detect in 2011, and the primary line of attack will continue to be via the internet, according to Redscan. Malware is now …

Gawker’s future security plans revealed

An internal memo sent to the Gawker staff by Thomas Plunkett, Gawker Media CTO, has revealed further details about last week’s massive breach that resulted in the …

Database of routers’ embedded private SSL keys published

The recent publishing of a database containing over 2,000 private SSL keys hard-coded into various routers – with their corresponding public certificates and …

110,000 credit card records stolen in NY tour company web server breach

The web server of CitySights NY – a company that organizes tours around New York on double-decker buses – has been breached and names, addresses, e-mail addresses, …

Virus yearbook 2010: Mariposa, Stuxnet and MSNWorm most noteworthy

PandaLabs is closing the year with a look at some of the unique and noteworthy viruses that have appeared over the last twelve months. The list of viruses is vast and varied, …

The world of mobile security fears and escalating compliance

2010 was another year of living dangerously. Companies dealt with huge increases in malware threats, growing mobile security concerns about consumer devices such as iPads, and …

Using social networks to profile, find and own your victims

In this video from DojoCon 2010, Dave Marcus, the Director of Security Research at McAfee Labs, illustrates the dangers of doing unintelligent things online. Dave shows you …

Cisco AnyConnect: Secure network connectivity for Apple iOS

Cisco AnyConnect Secure Mobility Solution, available from the App Store, offers highly secure network connectivity from any Apple iOS 4.1 device, improving the productivity of …

Experimental botnet reveals long sought answers

Is there a better way of analyzing the ins and outs of a botnet than making one yourself? The answer to that question was negative for ESET’s researcher Pierre-Marc …

Upsurge of attacks aimed at Facebook, iPad and smartphones

If you thought 2010 was challenging, just wait for 2011. Below are our top five 2011 security predictions for the coming year from Websense: The Stuxnet sequels are coming, …

Free security tool detects vulnerable and outdated software

Secunia released version 2.0 of their Personal Software Inspector (PSI), a popular free security tool for home users that protects their personal and financial information …

Google doesn’t want to share its encryption keys

Two years ago, the wish to have control over communication systems and the lack of technical resources of Indian intelligence agencies has led to a particular request targeted …

Don't miss

Cybersecurity news