Virtualized mobile computing on a secure flash drive
Absolute Identification and Kanguru Solutions released their collaborative product, the RocIT Defender Elite; a secure, pocket-sized virtualized mobile computing platform …
U.S. Senators keep trying to give “cyber emergency” powers to federal government
Not so long ago, a simulated cyber attack showed the unpreparedness of the United States to deal effectively with such an occurrence. When the officials “playing” …
Steady increase of generic malware
Sunbelt Software announced the top 10 most prevalent malware threats for the month of May 2010. Eight of the top 10 detections for May are reflecting the trend toward …
Panda Cloud Antivirus upgraded and expanded
Panda Cloud Antivirus has been upgraded and expanded. The upgrade of the Free Edition improves and extends the protection provided by the original free product, and the Pro …
Europe finds search data retention policies inadequate
The Article 29 Data Protection Working Party (an independent European Commission advisory body) has lately been much in the news, owning to their interest towards protecting …
Samsung smartphone shipped with malware-infected memory card
The latest mass-market product that has been found being shipped to customers while containing malware is the Samsung S8500 Wave phone with the Samsung bada mobile platform. …
HMRC breach recommendations being ignored
24 months since the publication of the Poynter report which was commissioned after the HMRC breach, and almost three years since the original misplaced discs came to light, …
zPOD puts your PC in your pocket
Zinstall announced zPOD, a privacy-enhanced mobile computing appliance which lets users instantly use their complete familiar environment on any available computer. zPOD …
Payment processing security trends in the catering industry
The catering industry has for some time now emerged as one of the businesses most affected by security breaches and card and identity theft. In reply to the increased threat, …
Users of Habbo Hotel virtual world hit by thieves
If you’re not an online gamer or a user of virtual worlds, it is easy to make light of the occasional news of account hijacking or thefts of virtual goods or money. …
Researchers develop malware to devise protection against it
Malware action – security reaction. In most cases, security researchers and professionals are bound to this vicious cycle, but there are some that have taken steps to …
IT pros are hacking their own enterprises to keep intruders out
A survey of IT security professionals has discovered that 83% consider commercial applications, the ones you buy off the shelf, to be riddled with code flaws and …
Featured news
Resources
Don't miss
- Microsoft fixes two actively exploited zero-days (CVE-2025-21418, CVE-2025-21391)
- 8Base ransomware group leaders arrested, leak site seized
- Apple fixes zero-day flaw exploited in “extremely sophisticated” attack (CVE-2025-24200)
- Arvest Bank CISO on building a strong cybersecurity culture in banking
- Review: Inside Cyber Warfare, 3rd Edition