ENISA report on top cyber threats
ENISA presented its list of top cyber threats, as a first “taste” of its interim Threat Landscape 2013 report. The study analyses 50 reports, and identifies an …
HP helps government agencies protect information
HP announced HP Continuous Monitoring, designed to identify and report IT security vulnerabilities in real time. The solution provides U.S. government agencies with an …
DeviceLock now prevents data leakage from Macs
DeviceLock announced DeviceLock Endpoint DLP Suite 7.3 that delivers essential device control capabilities for corporate endpoints with OS X Lion and OS X Mountain Lion …
Acronis advances secure BYOD with mobilEcho
Acronis launched mobilEcho 4.5, a mobile file management (MFM) solution that now includes in-app editing tools for Microsoft Office documents and military-grade, certified …
Researchers discover ties between TDSS and ZeroAccess rootkit families
A lot has been said and written about the long-lasting TDSS (or TDL) and the considerably newer ZeroAccess (or Sirefef) rootkits, and the similarities between the two have …
New wave of Shylock Trojan targets bank customers
Cybercrooks wielding the Caphaw (better known as Shylock) banking Trojan are once again targeting users of financial institutions around the world, warns Zscaler. The initial …
Beware of 419 scam emails delivered via CNN’s “Email This” feature
Email spammers often try to take advantage of current news and to impersonate legitimate news sites (usually CNN) in order to bypass spam filters and convince recipients to …
Mobile data security remains weak
Coalfire surveyed 400 individuals working in a variety of industries across North America who are not affiliated with their company’s IT department. Survey findings show …
The legal implications of BYOD
The legality of the common practice of remotely wiping or tracking an employee’s mobile device while asking workers to sign waivers giving their consent for such a …
Phishers increasingly target brands
The APWG is reporting in its latest Global Phishing Survey: Trends and Domain Name Use study that an increasing number of brands and their users have been targeted by …
What keeps IT pros up at night?
A new EiQ Networks survey reveals several concerns among IT professionals. The survey reflects responses from 272 IT decision makers including security managers, and network …
HP unveils community-sourced threat intelligence platform
HP announced HP Threat Central, a community-sourced security intelligence platform that will enable automated, real-time collaboration between organizations to combat advanced …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous