Global UTM and NGFW market to reach $5.32 billion in 2018
The dynamic nature of security threats and network traffic has challenged the efficacy of legacy firewall systems, paving the way for next generation firewalls (NGFW) and …
Relations between spam landscape actors can be leveraged for detection
Since late 2012, a group of researchers from UC Santa Barbara and RWTH Aachen University has been working on finding out the relations that exist between the different actors …
ESET analyzes first Android file-encrypting, TOR-enabled ransomware
One year ago, Android Defender, a hybrid comprising characteristics of a rogue AV and ransomware (the lockscreen type, not a file-encryptor) was discovered. Last month we saw …
Google unveils source code for Chrome encryption extension
Google has made publicly available the source code for a new Chrome extension that helps users encrypt, decrypt, digitally sign, and verify signed messages within the browser …
Why botnet takedowns can cause more harm than good
Zeus is a well-known and highly successful crimeware kit – the flat-pack furniture of the virus world. It is under constant development by several criminals or groups …
Critical bug in GnuTLS crypto library could allow malicious code execution
Another critical bug in an open source SSL/TLS (and DTLS) cryptographic library has been discovered and patched last week. The affected library is GnuTLS, and is used in a …
How do the new features in OS X Yosemite and iOS 8 impact security and privacy?
At the annual Worldwide Developer’s Conference (WWDC) Apple announced the latest versions of OS X and iOS. With this announcement came a long list of new features and …
What are the top security concerns of senior IT executives?
Most C-level executives would agree that protecting a company’s confidential data and trade secrets from the prying eyes of competitors is critical. Yet interactive …
Too many organizations miss their service availability goals
Continuity Software announced the results of its 3rd annual Service Availability Benchmark Survey, designed to enable IT infrastructure, business continuity and disaster …
Safari to include privacy-protecting search engine
Apple announced the inclusion of DuckDuckGo, the search engine that doesn’t track its users, in the future versions of Safari on iOS and OS X. This makes DuckDuckGo the …
12,000 users ask Google to forget them
12,000 pleas from users looking to be forgotten have been submitted to Google in the first 24 hours since the company created a dedicated submission page for such requests, …
Researcher automates discovery of Facebook users’ hidden friends
Putting a friend on Facebook on your “private” list does not guarantee you that anyone else won’t be able to spot the relationship, says researcher Shay …
Featured news
Resources
Don't miss
- Why AI code assistants need a security reality check
- GPS tracker detection made easy with off-the-shelf hardware
- 91% noise: A look at what’s wrong with traditional SAST tools
- AWS launches new cloud security features
- Chaining two LPEs to get “root”: Most Linux distros vulnerable (CVE-2025-6018, CVE-2025-6019)