Mobile Encryption for iOS and Android
Sophos announced a number of new enterprise product lines that together offer protection anywhere and on any device. Sophos Mobile Control provides lightweight device …
VirtualBox 4.0.8 released
VirtualBox enables desktop or laptop computers to run multiple operating systems simultaneously, and supports a variety of host operating systems, including Windows, Mac OS X, …
Facebook survey scam with a twist
Facebook survey scams that lure in users with promises of being able to see who looks at their profile are nothing new, but here is one that has some unusual twists and merits …
Two teenage GhostMarket members sentenced
Two UK teenagers who stole credit card details from a number of online casinos, betting companies and web hosting companies and sold them on the now defunct GhostMarket have …
IBM Informix Storage Manager security bypass
A vulnerability has been reported in IBM Informix Storage Manager, which can be exploited by malicious people to bypass certain security restrictions, according to Secunia. …
Microsoft investigates the current threat landscape
Microsoft published volume 10 of the its Security Intelligence Report (SIRv10) which provides perspectives on software vulnerabilities, software vulnerability exploits, …
Google authentication protocol flaw endangers Android users
If you’re an Android user that has still not upgraded to the 2.3.4 and 3.0 version, you’re in danger of having the information contained in various Google …
New Alureon variant improves on old evasion techniques
The Alureon Trojan (also known as TDL, TDSS and Tidserv) has been around since 2007, and it’s function consist mainly in allowing the attacker to intercept incoming and …
VMware acquires Shavlik Technologies
VMware has entered into a definitive agreement to acquire Shavlik Technologies, which provides a portfolio of on-premise and SaaS-based management solutions that enable SMBs …
Trojan paves way for rogue defragmenter
You might have heard about rogue AV solutions and scareware, but not many people have experienced a rogue defragmenter that hides files and (indirectly) asks money to return …
Wikipedia-like sites peddling fake pharmaceuticals
Wikipedia is practically a household name now, so it’s no wonder that spammers are trying to take advantage of the online encyclopedia’s popularity and (relative) …
iPhone-enabled wireless multimeter
Redfish Instruments introduced the iDVM Digital Multimeter which wirelessly connects to an iPhone, iPad, or iPod Touch via an ad hoc wireless network allowing users to …
Featured news
Resources
Don't miss
- AI isn’t one system, and your threat model shouldn’t be either
- LLMs work better together in smart contract audits
- Product showcase: NAKIVO v11.1 advances MSP service delivery with secure multi-tenant management
- Crypto theft in 2025: North Korean hackers continue to dominate
- Clipping Scripted Sparrow’s wings: Tracking a global phishing ring