How to make a cheap mobile malware jail
Analyzing mobile malware without spreading it further can be very difficult to achieve, especially when one wants the malware to behave as it would in the wild. Unlike …
McAfee detects kernel-mode malware
McAfee announced Deep Defender, which is capable of detecting nearly all kernel-mode malware. This level of security is possible with McAfee DeepSAFE technology because its …
Shinken: IT system and application monitoring
Shinken can monitor all IT from systems to end user applications. In case of a failure, it can alert the operation engineers so they can repair it. It has the same …
Fingerprint sensors for mobile ID devices
DigitalPersona launched a new generation of biometric fingerprint sensors designed specifically for the growing market of battery-powered mobile identification devices. The …
WatchGuard unveils new line of virtualized firewalls
WatchGuard is extending its line of UTM appliances to the virtual world. Designed for a VMware hypervisor environment, the new WatchGuard XTMv series of virtual firewalls …
Twitter protects freedom of speech and privacy of users
When LulzSec member Sabu recently answered a lot of questions on an impromptu Q&A session on Reddit by posting the answers on his Twitter account, he was asked why he …
Hardened Android kernel to be used by U.S. Army, government
The U.S. government is looking at replacing radio communication between federal, state and local law enforcement and response agencies with communication with smartphones, and …
Free Metasploit Community Edition released
Rapid7 launched Metasploit Community Edition: a new free addition to the Metasploit family of software solutions, which help security and IT professionals identify and …
Information theft still a serious threat to global business
Fraud remains predominantly an inside job, according to the Kroll Annual Global Fraud Report. The study shows that 60 percent of frauds are committed by insiders, up from 55 …
Beware of bogus Gmail Hacker software
Hacking into someone’s mail account can be easy if the person chose an easily guessable password, but could be nigh impossible to brute force it if it’s long and …
Huge threats still targeting power grids
One year ago, the Stuxnet virus had just been discovered. A year’s worth of analysis still has not unlocked its secrets but it has had a profound influence upon the …
IT execs view security and privacy as top priority
New and complex IT risks and changing business priorities challenge today’s IT leaders, according to a new survey from Protiviti. The results of the study reveal six …
Featured news
Resources
Don't miss
- LLMs are automating the human part of romance scams
- Superagent: Open-source framework for guardrails around agentic AI
- Security chaos engineering matters when nothing is broken
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible