Cyber espionage moves out of the shadows
During the first half of 2013, AppRiver screened more than 15 billion messages, nearly 13 billion of which were spam and another 171 million that carried viruses. Once again, …
NETGEAR introduces R6100 WiFi router
NETGEAR is expanding its family of 802.11ac wireless products with the R6100 WiFi Router. The R6100 is a dual band router that supports combined WiFi speeds up to 1200 Mbps …
Ubisoft breached, user account credentials compromised
Ubisoft has begun notifying account holders of a breach that resulted in their email addresses, usernames and (encrypted) passwords being compromised. “We recently …
Current cybercrime market is all about Cybercrime-as-a-Service
The cybercrime market is constantly evolving, and it is currently full of knowledgeable individuals who have focused on their core competencies to offer services to those who …
Litecoin-stealing Trojan found
Bitcoin is the most popular, but not the only crypto currency out there. As interest in and use of other ones rises, malware that tries to steal particular types of currencies …
Protect Android devices from theft and malware
The new Norton Mobile Security with antivirus protects your Android phones and tablets from theft, loss, malware and viruses. Remotely locate your lost or stolen device. Scan …
Keep all your software up-to-date with F-Secure
The month of June saw security updates for well over 100 vulnerabilities in just the most commonly used software for Windows workstations, with each of these vulnerabilities …
Two-factor authentication for websites
Incapsula announced Login Protect, which enables instant activation of two-factor authentication to websites and Web applications, without requiring any coding, application …
NSA hacking and spying on EU officials
Over the weekend, the German Der Spiegel published a report based on a document leaked by NSA whistleblower Edward Snowden that show that the US has been spying on EU …
Teaching a computer to play Memory advances security
Computer science researchers have programmed a computer to play the game Concentration (also known as Memory). The work could help improve computer security – and …
Android hack tool harvests info from PCs
Stealing information is a piece of cake if you can manage to get malware on the target’s Windows computer, but did you know that it can also be as easy as connecting …
Hacker indicted for Romney tax return extortion scheme
34-year-old Michael Mancil Brown of Franklin, Tennessee, was indicted today by a federal grand jury in Nashville, for allegedly engaging in an extortion and wire fraud scheme …
Featured news
Resources
Don't miss
- Why outsourcing cybersecurity is rising in the Adriatic region
- Microsoft rolls out Windows 11 “quick recovery” feature
- Maximum severity Cisco ISE vulnerabilities exploited by attackers
- Phishing campaign targets U.S. Department of Education’s G5 portal
- Cervantes: Open-source, collaborative platform for pentesters and red teams