Replacing passwords and PINs with your heartbeat
We’ve been hearing for a while now that passwords will soon become a thing of the past and, as it seems now, biometric authentication is likely to take their place. The …
Fake Facebook “Pages you might like” emails deliver malware
Fake Facebook emails urging users to review some Pages they might like are hitting inboxes around the world, warns ThreatTrack. Sporting “Hi [name], here are some Pages …
GitHub adds two-factor authentication option
GitHub is the latest web-based service to add a 2-factor authentication feature to make the users’ login process more secure. “When logging in to GitHub, after …
Barracuda launches Barracuda Firewall X100 and X101
Barracuda Networks announced the new Barracuda Firewall X100 and X101, next-generation firewalls designed for small businesses. Barracuda also released new firmware, version …
FireEye introduces real time, continuous protection platform
FireEye announced Oculus, a global, real time, continuous protection platform. Oculus is comprised of three components: Threat prevention platform – The FireEye Threat …
Head of INTERPOL on the key to protecting cyberspace
With the physical and virtual worlds becoming increasingly interconnected, INTERPOL Secretary General Ronald K. Noble told the Underground Economy 2013 conference at the world …
Email data protection through a mobile app
ZixCorp announced commercial availability of ZixOne, a mobile email app that solves the key IT challenge created by the BYOD trend. ZixOne manages access to corporate email …
Neohapsis and Arxan protect sensitive apps
Neohapsis and Arxan announced a partnership to offer enhanced tamper-resistance and self-defense built into a comprehensive application security strategy. According to recent …
Online backup for mobile devices: Key factors to consider
Most technology users keep personal information (contacts, calendars, documents, photos, etc.) on their mobile devices. That information isn’t protected if the mobile is …
Hand of Thief Linux Trojan fails to work as promised
RSA researchers have recently spotted a banking Trojan targeting Linux systems being sold online by a cybercrime team based in Russia. Dubbed Hand of Thief by its creator(s), …
AT&T’s massive call detail record database accessible to DEA agents
Since 2007, AT&T employees have been working side by side with US Drug Enforcement Administration and local law enforcement agents, helping them access electronic call …
Arbor Networks acquires Packetloop
Arbor Networks has acquired privately held Packetloop, an innovator and provider of Security Analytics. Terms of the deal were not disclosed. Arbor plans to invest in and …
Featured news
Resources
Don't miss
- Trojanized SonicWall NetExtender app exfiltrates VPN credentials
- High-risk WinRAR RCE vulnerability patched, update quickly! (CVE-2025-6218)
- Why work-life balance in cybersecurity must start with executive support
- Reconmap: Open-source vulnerability assessment, pentesting management platform
- Microsoft will start removing legacy drivers from Windows Update