ManageEngine enhances Firewall Analyzer and EventLog Analyzer
ManageEngine announced enhancements to its firewall security and configuration management software, Firewall Analyzer, and to EventLog Analyzer, its log management and IT …
Replacing passwords and PINs with your heartbeat
We’ve been hearing for a while now that passwords will soon become a thing of the past and, as it seems now, biometric authentication is likely to take their place. The …
Fake Facebook “Pages you might like” emails deliver malware
Fake Facebook emails urging users to review some Pages they might like are hitting inboxes around the world, warns ThreatTrack. Sporting “Hi [name], here are some Pages …
GitHub adds two-factor authentication option
GitHub is the latest web-based service to add a 2-factor authentication feature to make the users’ login process more secure. “When logging in to GitHub, after …
Barracuda launches Barracuda Firewall X100 and X101
Barracuda Networks announced the new Barracuda Firewall X100 and X101, next-generation firewalls designed for small businesses. Barracuda also released new firmware, version …
FireEye introduces real time, continuous protection platform
FireEye announced Oculus, a global, real time, continuous protection platform. Oculus is comprised of three components: Threat prevention platform – The FireEye Threat …
Head of INTERPOL on the key to protecting cyberspace
With the physical and virtual worlds becoming increasingly interconnected, INTERPOL Secretary General Ronald K. Noble told the Underground Economy 2013 conference at the world …
Email data protection through a mobile app
ZixCorp announced commercial availability of ZixOne, a mobile email app that solves the key IT challenge created by the BYOD trend. ZixOne manages access to corporate email …
Neohapsis and Arxan protect sensitive apps
Neohapsis and Arxan announced a partnership to offer enhanced tamper-resistance and self-defense built into a comprehensive application security strategy. According to recent …
Online backup for mobile devices: Key factors to consider
Most technology users keep personal information (contacts, calendars, documents, photos, etc.) on their mobile devices. That information isn’t protected if the mobile is …
Hand of Thief Linux Trojan fails to work as promised
RSA researchers have recently spotted a banking Trojan targeting Linux systems being sold online by a cybercrime team based in Russia. Dubbed Hand of Thief by its creator(s), …
AT&T’s massive call detail record database accessible to DEA agents
Since 2007, AT&T employees have been working side by side with US Drug Enforcement Administration and local law enforcement agents, helping them access electronic call …
Featured news
Resources
Don't miss
- Building a healthcare cybersecurity strategy that works
- AI-generated images have a problem of credibility, not creativity
- The five-minute guide to OT cyber resilience
- Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
- Apple offers $2 million for zero-click exploit chains