Fake AVG AV apps offered on Google Play
However hard Google works to prevent malicious apps from being offered on Google Play, its official online Android market, some always get through. AVG researchers warn about …
Phishers use free iPhone 5S as lure ahead of launch
As the moment when Apple is set to unveil its latest offerings slowly approaches and it seems almost sure they will show several version of iPhone 5, cyber scammers are trying …
Security heavyweights to keynote HITB conference in Malaysia
This October, both Chief Security Officers of Akamai and Facebook will be in Kuala Lumpur to deliver their Day 1 and Day 2 keynote talks at HITBSecConf 2014 (October 16th and …
Timing is an influential risk-factor for cyber attacks
There are several dates throughout the year that are notorious for wreaking havoc on businesses via DDoS attacks, data breaches and even malware or botnet assaults. According …
HyTrust Appliance gets role-based monitoring
HyTrust released HyTrust Appliance 3.5, which enables enterprises to virtualize mission-critical applications and deploy multi-tenant private clouds. This solution for policy …
Appthority unveils app risk and policy management solution
Appthority announced an all-in-one app risk management solution combining app reputation analysis with a new policy management functionality, enabling organizations to create …
Executives, IT officers most concerned about malicious insiders
An international survey polling 260 respondents from a wide variety of industry sectors has revealed that over half of them are more worried about their own employees turning …
With crypto being insecure, whom do you trust?
Last week’s revelation that the NSA has for years now concentrated on subverting the encryption that protects commerce and banking transactions, sensitive data, e-mails, …
Fake emails saying US is bombing Syria lead to malware
Two distinct spam campaigns taking advantage of the current political situation in Syria have been spotted by Symantec and Kaspersky Lab researchers. The first one consists of …
McAfee releases 2014 core PC security products
McAfee announced its new 2014 line of core PC security suites delivering increased power and performance with a lighter and faster footprint resulting in an enhanced user …
How important is penetration testing?
With cyber attacks becoming the norm, it is more important than ever before to undertake regular vulnerability scans and penetration testing to identify vulnerabilities and …
Exploring attacks against PHP applications
Imperva released its September Hacker Intelligence Initiative report which presents an in-depth view of recent attacks against PHP applications, including attacks that involve …
Featured news
Resources
Don't miss
- Building a healthcare cybersecurity strategy that works
- AI-generated images have a problem of credibility, not creativity
- The five-minute guide to OT cyber resilience
- Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
- Apple offers $2 million for zero-click exploit chains