Advanced threat detection from Cylance available for free
The Cylance PrivateDETECT for endpoints is now ready for broad beta consumption as limited time freeware. Cylance’s technological approach is to apply big math and …
Confirmed: Carberp source code leaked
It has been confirmed: the password-protected ZIP file that is currently sold on a number of underground forum does indeed contain the source code of the infamous Carberp …
Stolen laptop containing info on victims, suspects, witnesses and police
Some 2,300 individuals have been notified that they might become victims of identity thieves after a laptop and a personal hard drive belonging to an undercover officer of a …
Blizzard suspends mobile app access following account hijacks
A number of World of Warcraft players have been unpleasantly surprised this last week to find that someone has apparently broken into their accounts and bought low-level items …
Are cyber attacks more dangerous than physical attacks?
Eighty percent of C-level executives and IT security professionals believe that cyber attacks pose a greater risk to their nation than physical attacks, while 51 percent …
Creating a cloud security policy
Building a cloud security policy is a crucial step to take before diving into the cloud to ensure maximum benefits are achieved and data is secure. But some organizations, in …
Firefox 22 delivers 14 security updates
Mozilla released Firefox 22, which includes 14 security updates: four are critical, six high, three moderate and one low. Fixed in this version: MFSA 2013-62 Inaccessible …
AirWatch enhances laptop management solution
AirWatch announced enhancements to its laptop management solution that provides additional functionality and platform support for organizations that need to manage all of …
Private, secure texting app for iOS
With an estimated 6 billion text messages sent every day in the United States alone, text messaging has become the primary means of communication for a large portion of the …
SMBs are embracing cloud-based services
Cloud-based applications are forcing SMBs to balance IT requirements with employees’ needs for anytime, anywhere access to information, according to Spiceworks. …
Lulzsec hacker Davis freed, back on the Internet
Jake Davis (aka Topiary), the former Lulzsec hacker and spokesman, has been released from the Feltham Young Offenders’ Institution, where he spent 37 days following his …
Car hack attack a possible theory behind journalist’s death
The upcoming DEFCON hacking conference will have many presenters touching on a great number of subjects, including that of car hacking. Security researcher Charlie Miller, …
Featured news
Resources
Don't miss
- Why outsourcing cybersecurity is rising in the Adriatic region
- Microsoft rolls out Windows 11 “quick recovery” feature
- Maximum severity Cisco ISE vulnerabilities exploited by attackers
- Phishing campaign targets U.S. Department of Education’s G5 portal
- Cervantes: Open-source, collaborative platform for pentesters and red teams