EU politicians want to suspend banking data-sharing program
Following the claims that the NSA has spied on the Belgian-based Society for Worldwide Interbank Financial Telecommunication (SWIFT) – the organization that provides the …
Fake AVG AV apps offered on Google Play
However hard Google works to prevent malicious apps from being offered on Google Play, its official online Android market, some always get through. AVG researchers warn about …
Phishers use free iPhone 5S as lure ahead of launch
As the moment when Apple is set to unveil its latest offerings slowly approaches and it seems almost sure they will show several version of iPhone 5, cyber scammers are trying …
Security heavyweights to keynote HITB conference in Malaysia
This October, both Chief Security Officers of Akamai and Facebook will be in Kuala Lumpur to deliver their Day 1 and Day 2 keynote talks at HITBSecConf 2014 (October 16th and …
Timing is an influential risk-factor for cyber attacks
There are several dates throughout the year that are notorious for wreaking havoc on businesses via DDoS attacks, data breaches and even malware or botnet assaults. According …
HyTrust Appliance gets role-based monitoring
HyTrust released HyTrust Appliance 3.5, which enables enterprises to virtualize mission-critical applications and deploy multi-tenant private clouds. This solution for policy …
Appthority unveils app risk and policy management solution
Appthority announced an all-in-one app risk management solution combining app reputation analysis with a new policy management functionality, enabling organizations to create …
Executives, IT officers most concerned about malicious insiders
An international survey polling 260 respondents from a wide variety of industry sectors has revealed that over half of them are more worried about their own employees turning …
With crypto being insecure, whom do you trust?
Last week’s revelation that the NSA has for years now concentrated on subverting the encryption that protects commerce and banking transactions, sensitive data, e-mails, …
Fake emails saying US is bombing Syria lead to malware
Two distinct spam campaigns taking advantage of the current political situation in Syria have been spotted by Symantec and Kaspersky Lab researchers. The first one consists of …
McAfee releases 2014 core PC security products
McAfee announced its new 2014 line of core PC security suites delivering increased power and performance with a lighter and faster footprint resulting in an enhanced user …
How important is penetration testing?
With cyber attacks becoming the norm, it is more important than ever before to undertake regular vulnerability scans and penetration testing to identify vulnerabilities and …
Featured news
Resources
Don't miss
- Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech
- Securing vehicles as they become platforms for code and data
- How service providers can turn cybersecurity into a scalable MRR engine
- Stop settling for check-the-box cybersecurity policies
- Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257)