Please turn on your JavaScript for this page to function normally.
Software Blade controls over 50,000 Web 2.0 applications and widgets

Check Point announced its new Application Control Software Blade that enables organizations to secure and manage the use of thousands of Web 2.0 applications in the …

Project Vigilant searching for volunteer hackers at Defcon

Project Vigilant, a division of BBHC Global LLC (an information security firm), is a private, semi-secret, volunteer-based organization of “cyber spies” that is …

Microsoft patches the critical Windows LNK vulnerability

An emergency out-of-band update for patching the critical LNK vulnerability has been released by Microsoft. “The vulnerability exists because Windows incorrectly parses …

Big firms fail the test as social engineers demonstrate their abilities at Defcon

The social engineering capture-the-flag-style contest planned for the second and third day of this year’s edition of Defcon was executed without a hitch. No financial …

Bad news for BlackBerry users in the Middle East

What seems to be a power play between RIM, one of the biggest manufacturers of smartphones in the world and the TRA, the telecommunications regulation body in the United Arab …

Web 2.0 security in the workplace

The use of social networking applications has significantly lowered the security posture for up to 82 percent of organizations in a new survey by the Ponemon Institute and …

Free anti-spam software from Cloudmark

Released as a free download, Cloudmark DesktopOne is a lightweight application that continuously filters e-mail to eliminate spam and protect users against phishing and …

Cyber threats to national security

Cybersecurity has increasingly become a national security priority over the past decade, according to a report by CACI and the U. S. Naval Institute (USNI). Cyber threats may …

Device security among biggest mobility concerns

McAfee announced the results of a survey of 150 Fortune 500 CIOs, CTOs and CSOs that reveals 76 percent of respondent organizations are planning at least one strategic …

55,000 machines compromised by Mumba botnet

Each year, cybercriminals generate billions of dollars by their criminal activities online. Therefore, the longer period of time a given malware remains undetected is directly …

Week in review: ATMs hacked, malware attacks

Here’s an overview of some of last week’s most interesting news, interviews, articles and reviews: U.K. seeks cyber experts, offers challenge and educational and …

Movie files run in QuickTime Player trigger malware download

Specifically crafted .mov files trigger the download of malware masquerading as a codec update and an installation file for another player when run in the latest (7.6.6) …

Don't miss

Cybersecurity news