Analysis of Poison Ivy remote access tool
A new FireEye report highlights the resurgence of Poison Ivy, a malware Remote Access Tool (RAT) that has remained popular and effective eight years after its original release …
The mobile cybercrime landscape is becoming more defined
McAfee found that Android-based malware achieved a 35 percent growth rate not seen since early 2012. This rebound was marked by the continued proliferation of SMS-stealing …
Rapid7 unveils analytics for security controls and user risk
Rapid7 showcased two new IT security insight solutions at the UNITED 2013 security summit. Lee Weiner, senior vice president of products and engineering at Rapid7 comments: …
Veeam Backup & Replication 7 released
Veeam Software announced Veeam Backup & Replication 7, which introduces built-in WAN acceleration and backup from storage snapshots. Built-in WAN acceleration copies data …
Is evading an IP address block to access a website against the law?
A ruling in a lawsuit mounted by Craigslist and against ad indexing firm 3Taps has once again brought attention to the Computer Fraud and Abuse Act (CFAA), its vague wording, …
MitB malware targets steam
When cybercriminals use Man-in-the-Browser (MitB) malware to commit online fraud, financial institutions are not their only targets. Dating, eCommerce, hospitality, and travel …
Groklaw shuttered because email is no longer safe
Since 2003, Pamela Jones – then a simple paralegal, now a journalist and editor – covered legal news regarding free and open source software on her law blog …
UK agents detain Greenwald’s partner, destroy The Guardian’s hard drives
It has been an eventful weekend for The Guardian newspaper, its reporter Glenn Greenwald and his partner David Miranda, as the British police held the latter and questioned …
Nmap 6.40 released
Nmap is a free and open source utility for network exploration or security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the …
Why continuous IT cost optimization is essential
After years of tactical cost-cutting, many organizations now face the challenge of continuous IT cost optimization after the realization that optimization practices are never …
EVault backup appliances now with cloud-connected software for failproof recovery
EVault announced a new portfolio of EVault backup appliances, expanding its enterprise-grade appliances to accommodate the backup and recovery needs of any organization …
ENISA analyzes major security incidents in the EU
The European Union Agency for Network and Information Security (ENISA) today issued a new report providing an overview of the major outage incidents in the EU in 2012. The …
Featured news
Resources
Don't miss
- Why the SOC needs its “Moneyball” moment
- From posture to prioritization: The shift toward unified runtime platforms
- Why should companies or organizations convert to FIDO security keys?
- Trojanized SonicWall NetExtender app exfiltrates VPN credentials
- High-risk WinRAR RCE vulnerability patched, update quickly! (CVE-2025-6218)