Malicious emails target multiple operating systems
Over the past several years, we have seen the proliferation of malware targeting mobile devices such as Android and iOS. The vast majority of the malware has been designed to …
NERC CIP compliance insufficient to ensure electric system security
Tripwire announced the results of a survey on North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) compliance. The online survey was …
Watch out for less advanced malware and new exploit kits
This year, cybersecurity took center stage with nation-state attacks, numerous high-profile data breaches and prominent cybercriminal arrests. Websense Security Labs outlined …
5 mobile app security tips
ICSA Labs released a list of 5 mobile app security tips to help enterprises protect their data. 1. Dynamic analysis is a must. If deploying security tested mobile applications …
The state of governmental cloud deployments in Europe
The EU’s cybersecurity Agency ENISA has analyzed the present state of play regarding governmental cloud deployment in 23 countries across Europe. In the report the …
Unapproved cloud products put company data at risk
Egnyte released results from a new survey by Harris Interactive among 2,020 U.S. adults illustrates a major exposure for today’s businesses when it comes to the transfer …
MOVEit Cloud 8.0 extends managed file transfer to mobile devices
Ipswitch File Transfer launched MOVEit Cloud 8.0, adding mobile support to the MOVEit Managed File Transfer (MFT) cloud service. The MOVEit MFT system is used by businesses …
Safari, Chrome and Samsung Galaxy S4 taken down in Mobile Pwn2Own
Results from the second annual Mobile Pwn2Own competition ending today at PacSec Applied Security Conference in Tokyo, Japan, are in: the successful compromises include …
Microsoft unveils state-of-the-art Cybercrime Center
Microsoft announced the opening of the Microsoft Cybercrime Center, which combines Microsoft’s legal and technical expertise as well as tools and technology with …
Spam campaign doubles on threats
Some malware peddlers might be moving on from using the Blackhole exploit kit to deliver malicious code, but others are still not ready to give up on it, as proven by a spam …
Alliance dedicated to wireless biometric authentication launched
Natural Security has announced the launch and newly elected governing board of the world’s first open Alliance dedicated to secure transactions based on wireless and …
Compromised Adobe accounts include military and government users
The Adobe hack is truly gargantuan, what with all the stolen source code of a number of extremely popular software and the exfiltrated database containing user email …