Executives, IT officers most concerned about malicious insiders
An international survey polling 260 respondents from a wide variety of industry sectors has revealed that over half of them are more worried about their own employees turning …
With crypto being insecure, whom do you trust?
Last week’s revelation that the NSA has for years now concentrated on subverting the encryption that protects commerce and banking transactions, sensitive data, e-mails, …
Fake emails saying US is bombing Syria lead to malware
Two distinct spam campaigns taking advantage of the current political situation in Syria have been spotted by Symantec and Kaspersky Lab researchers. The first one consists of …
McAfee releases 2014 core PC security products
McAfee announced its new 2014 line of core PC security suites delivering increased power and performance with a lighter and faster footprint resulting in an enhanced user …
How important is penetration testing?
With cyber attacks becoming the norm, it is more important than ever before to undertake regular vulnerability scans and penetration testing to identify vulnerabilities and …
Exploring attacks against PHP applications
Imperva released its September Hacker Intelligence Initiative report which presents an in-depth view of recent attacks against PHP applications, including attacks that involve …
Free asset tracking for SMBs
GFI Software announced Free Asset Tracking Forever, a no-charge component of the GFI Cloud suite of cloud-based IT management services that enables organizations to audit and …
SpydrSafe Mobile Security 2.0 released
SpydrSafe 2.0 integrates with and leverages iOS 7’s new native application management capabilities. In addition, it delivers an array of proprietary, advanced security …
Anonymous user authentication from LaunchKey
LaunchKey introduced anonymous user authentication capabilities as part of its technology platform that kills passwords. The new multi-factor authentication technology …
Week in review: FinFisher’s spying capabilities, and NSA’s quest to subvert encryption
Here’s an overview of some of last week’s most interesting news and articles: The TAO of NSA It has been pointed out that NSA has its own hacking unit called …
Backdoor brute-forces Joomla and WordPress sites
A recently discovered backdoor with brute-forcing capabilities that are used against Joomla- and WordPress-managed blogs has shown, once again, the importance of keeping your …
NSA’s quest to subvert encryption, install backdoors
Journalists from the NYT and ProPublica have joined efforts and have published the most explosive article to date dealing with revelations about NSA spying efforts. Backed by …
Featured news
Resources
Don't miss
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
- Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
- A new way to think about zero trust for workloads
- Heisenberg: Open-source software supply chain health check tool
- Securing real-time payments without slowing them down