Please turn on your JavaScript for this page to function normally.
New malicious PDF

A new type of malicious PDF file has recently been spotted in the wild. This one contains an malicious object that was embedded into the file through the use of common the …

Poisoned search results: Our daily reality

The biggest threat to search engines are not their competitors, but poisoned search results. Since the moment when search engines have largely become the starting point for …

Perception of data security at odds with reality

Nearly three-quarters of organizations believe they have adequate policies in place to protect sensitive, personal information, yet more than half have lost sensitive data …

Secure USB flash drive with on-board PIN pad

The LOK-IT is a USB flash drive with a hardware-based security system that requires users to log in on a self-contained, on-board PIN pad. The PIN pad is not connected to the …

Lansweeper 4.0: Network inventory tracking

Lansweeper 4.0 is a Windows network inventory application that will allow yo to do a complete inventory of your Windows network without the need to install an agent on all …

Government-grade voice security for BlackBerry

Cellcrypt released its high-strength government-grade encryption application for mobile devices, including BlackBerry smartphones, on both T-Mobile’s secure cellular …

nShield Edge: USB-attached hardware security module

Thales released nShield Edge, the world’s first FIPS 140-2 Level 3 validated USB-attached hardware security module (HSM). It features an integrated card reader and …

Changes in new ZeuS variants

The ZeuS/Zbot Trojan variants have been around for a long time. It has come to the point where the name is no longer recognized only by security specialist, but by the general …

Scammers’ link architectures

As much as it hurts us to admit, online scamming shares many of the characteristics of a legal business. Why? Because, in the end, they have the same goal – revenue. To …

Rogue software details: PC-Guide

PC-Guide is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

The evolution of PCI DSS

The Ponemon Institute conducted a research study about the upcoming version of the Payment Card Industry Data Security Standards (PCI DSS), a new set of standards expected to …

ID Vault for iPhone: Single tap login for online accounts

White Sky introduced a secure way to access any online account from the iPhone with its ID Vault for iPhone. ID Vault is the first iPhone app that offers true single-tap …

Don't miss

Cybersecurity news