The anatomy of the Gameover Zeus variant
The “Gameover” malware is a relatively new, “private” version of ZeuS. Support for the distributed command and control (C2) tools, integrated into the …
Easy ways to protect your privacy and data
In spite of one high profile computer security breach after another, many people are still not employing even the most basic safeguards to protect their privacy and their …
Dell delivers new storage backup
Dell announced advancements in its Fluid Data architecture that enable customers to quickly adapt to the changing demands of their organizations and increase automation for …
Google admits profiting from ads for illegal sites
You should know by now that the fact that Google is serving you an advertisement does not mean that it’s safe to click on it. Time and time again examples of malware …
Phishing emails from spoofed US-CERT addresses
US-CERT has issued a public warning about a phishing email campaign using spoofed US-CERT email addresses. “The subject of the phishing email is: ‘Phishing …
Smart network cloud application platform
NETGEAR announced its Smart Network Cloud Application Platform, a new technology platform that enables consumers to purchase and download apps from the cloud for their home …
Splunk Enterprise 4.3 released
Splunk Enterprise, a software for collecting, indexing and harnessing machine data, reached version 4.3. “All kinds of companies are using Splunk to harness the value in …
Key security developments for 2012
Kroll Ontrack, the leading provider of data recovery, electronic discovery, and information management products and services, today announced the most important technology …
IPAM and DNSSEC key management integration
The Thales nShield hardware security module (HSM) is now integrated with the Infoblox DNS platform to enable the deployment of DNSSEC. This joint solution addresses common …
The Linux Command Line
Thanks to user-friendly distributions like Ubuntu, more people are running Linux than ever before. But many users stick to the GUI and point and click their way through tasks, …
Microsoft releases seven bulletins
2012’s first Patch Tuesday has seven bulletins, including the postponed bulletin from December 2011 that addresses the BEAST style information disclosure. Talking about …
Police system compromised due to parental spying
The Patras program, used by the German Federal Police for surveillance and tracking of suspects and their vehicles via GPS, has recently been suspended for a while and its …
Featured news
Resources
Don't miss
- What 35 years of privacy law say about the state of data protection
- 40 open-source tools redefining how security teams secure the stack
- Password habits are changing, and the data shows how far we’ve come
- Product showcase: Tuta – secure, encrypted, private email
- Henkel CISO on the messy truth of monitoring factories built across decades