Identity fraud hits 11.6 million in the US
In 2011 identity fraud increased by 13 percent. More than 11.6 million adults became a victim of identity fraud in the United States, while the dollar amount stolen held …
New capabilities for the IBM security intelligence platform
IBM unveiled new capabilities planned for its security intelligence platform designed to combine deep analytics with real-time data feeds from hundreds of different sources to …
Facebook scams racing against the clock
Facebook scammers have lately initiated a number of scams that use an unusual approach to make users “like” 70+ Facebook pages without even knowing what they are. …
Six principles for effective cloud computing
The growing shift to cloud computing can deliver significant value—but most enterprises have little knowledge of the perils of transferring IT decision making away from …
Juniper Networks acquires Mykonos Software
Juniper Networks has acquired Mykonos Software, a provider of Intrusion Deception Systems that protect websites and web applications. Under the terms of the agreement, Juniper …
Metasploit identifies IPv6 security risks
Rapid7 announced that the new version of Metasploit 4.2 allows users to fully test whether IPv6 addresses on their network are vulnerable to cyber attacks. This is …
New backup appliances from Imation
Imation introduced new purpose-built backup appliances designed to enable SMBs to safeguard their information with multiple levels of data protection from a single backup …
Virtualized security routers for cloud security
Halon Security announced a next-generation firewall and security router as a virtual appliance named Virtual Security Router (VSR). VSR is a complete security package for …
Trojan hijacks often-used DLL file for stealthier approach
A new dropper Trojan has been detected by BitDefender researchers, and this one utilizes an interesting technique in order to hide from antivirus software installed on the …
Indian govt to ask Yahoo, Google to route emails through servers in India
Web mail service providers such as Google, Yahoo, and others will be asked to route all emails accessed in India through servers located in the country – even if the …
New Zeus/SpyEye makes bots function as C&C servers
The latest build of the Zeus/SpyEye malware shows a change that could very well hamper the security researchers’ ability to take down the botnets using it and to find …
Users don’t bother changing default passwords
Most people working with sensitive information want stricter security policies but rarely bother changing default, automatically generated and assigned passwords. To collect …
Featured news
Resources
Don't miss
- Microsoft reveals actively exploited Office zero-day, provides emergency fix (CVE-2026-21509)
- When open science meets real-world cybersecurity
- Poland repels data-wiping malware attack on energy systems
- Inside Microsoft’s veteran-to-tech workforce pipeline
- Brakeman: Open-source vulnerability scanner for Ruby on Rails applications