Facebook users targeted by unimaginative phishing campaign
A phishing campaign targeting Facebook users is currently under way and lures users with messages coming from compromised accounts seemingly containing links to various …
Information security pros stretched thin and overworked
A study based on a survey of more than 10,000 information security professionals worldwide finds that a growing number of technologies being widely adopted by businesses are …
Managed file transfer with large enterprise clustering
Axway introduced large enterprise clustering for its SecureTransport offering. SecureTransport simplifies and secures file transfers between people, sites, applications and …
Distributed security architecture for security enforcement
The new borderless organizations have dramatically changed the definition of how, when and where people work, causing a need to redefine the way security solutions are built …
Comprehensive vulnerability, configuration, OS and app auditing
nCircle announced that its solutions now audit for over 40,000 conditions including vulnerabilities, configurations, operating systems and applications. The company also …
Real-time threat intelligence delivery
As the threat landscape is evolving on a daily basis, it is imperative that organizations and their IT security teams are aware of the latest vulnerability threats. Perimeter …
Canadian government networks breached by Chinese hackers?
When it comes to covert cyber attacks on government networks, it somehow seems that they can always be traced back to servers in China. It is always acknowledged that that …
Mobile security solution enforces policy in the cloud
Zscaler unveiled Zscaler Mobile, which adds a uniform way to secure the mobile experience for small to large organizations. The solution enforces policy in the cloud, not on …
Securing data centers from blended threats
Fortinet announced the addition of a new consolidated security appliance to its FortiGate product family, and a new release of its FortiOS 4.0 operating system for said …
Moderately critical MS Windows vulnerability revealed
Information about a critical Microsoft Windows SMB browser election request parsing vulnerability turned up two days ago on the Full Disclosure mailing list and further …
A Trojan-Clicker for Android spotted
A new Android Trojan – dubbed HongTouTou or ADRD – has been spotted targeting Chinese-speaking users. Repackaged with popular Android applications and games, it is …
Cloud encryption software for private cloud infrastructures
CREDANT announced the beta program for its cloud encryption software for virtual desktop infrastructure (VDI) private cloud infrastructures. With this launch, the company …
Featured news
Resources
Don't miss
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)
- GitPhish: Open-source GitHub device code flow security assessment tool
- Healthcare CISOs must secure more than what’s regulated