Malware protection tips for social media users
Facebook, Twitter, MySpace, LinkedIn… the list of social media sites people use almost daily seems to grow exponentially. Although these places may be bastions of free …
Trend Micro announces Deep Security 7.5
Trend Micro announced the latest version of its security software that protects operating systems, applications and data on physical, virtual and cloud servers, and virtual …
Email still the top source of data loss
Email continues to be the number one source of data loss risks in large enterprises as more than a third (35 percent) investigated a leak of confidential or proprietary …
New virtual security gateway simplifies cloud security
Check Point announced the new Security Gateway Virtual Edition (VE) with VMsafe integration that secures the cloud with a firewall and protects dynamic virtual environments …
CA to acquire advanced authentication provider Arcot Systems
CA Technologies will acquire Arcot Systems, a provider of authentication and fraud prevention solutions in an all-cash transaction valued at $200 million. The acquisition of …
1 in 3 people think all websites pose a security threat
More than 1 in 3 people admit that when it comes to security, all websites are equally dangerous, all over the Internet, according to a survey by Avira. In the survey, a …
Travelers embrace smart cards
The increasing popularity of traveling has encouraged the large community of travelers to embrace technologies – such as smart card technology – that will simplify …
Misconfigured networks main cause of breaches
Responses to a survey from attendees of the DEFCON 18 conference revealed that 73% came across a misconfigured network more than three quarters of the time – which, …
India overtakes U.S. as biggest virus producer
India has overtaken the US as the single biggest producer of viruses, according to analysis of internet threats by Network Box. India is now responsible for 13.74 per cent of …
Wireshark 1.4.0 released
Wireshark is a popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education. The following features are new (or have been …
Mobile security cloud model
The first mobile security cloud model was introduced by NetQin Mobile today. The model is composed of three parts: A cloud security platform – knowledge repositories …
Ethical malcoders get their own conference
You have heard of Black Hat, Defcon, RSA Conference and Info Security, but does the name MalCon ring a bell? Probably not, since the newly started conference on malware is yet …
Featured news
Resources
Don't miss
- Microsoft introduces protection against email bombing
- Sudo local privilege escalation vulnerabilities fixed (CVE-2025-32462, CVE-2025-32463)
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it