Viewfinity launches a new application control solution
Viewfinity announced the availability of the Viewfinity Application Control solution, a homogeneous software solution that includes application whitelisting, managing trusted …
McAfee ePolicy Orchestrator exploitation tool
US-CERT’s latest advisory focuses on an exploit tool for McAfee ePolicy Orchestrator. The tool targets two vulnerabilities found in ePO versions 4.6.5 and earlier. In …
INTERPOL and Trend Micro to collaborate against cybercrime
Trend Micro is to collaborate with INTERPOL, the world police body, to support global law enforcement programmes to combat cybercrime. The announcement is the latest in …
Microsoft helped NSA get around its encryption
It has been a bad month for US Internet giants, but things got even worse for Microsoft as the latest batch of NSA documents leaked by Edward Snowden revealed that the company …
Unusual Facebook spam campaign delivers malicious Macros
A bizarre spam / malware delivery campaign is currently targeting Facebook users. It starts with the offer to see a video of a girl performing a salacious act – and this …
Infographic: Is your information safe?
ID Experts released an infographic that provides a snapshot of identity theft and data breach over the last decade. Click on the image below to see the large version. Data …
Free malware removal tool gets new features
The fourth generation of Emsisoft Emergency Kit is now available. It now boasts an improved cleaning function for the removal of malicious software. And at the same time it …
EMC releases array of new products
EMC announced new hardware and software products that enable customers to deploy new Protection Storage Architectures that address today’s and tomorrow’s data …
Bug bounties are cheaper than hiring full-time bug hunters
Software companies that have instituted bug bounties are on the right track, a recently published report by researchers of the University of California, Berkeley computer …
Blue Coat Internet monitoring devices (mis)used in Iran, Syria, Sudan
Even though US sanctions should have made it impossible, filtering and Internet monitoring devices by US-based Blue Coat Systems can be found on many computer networks in …
Bluebox releases free scanner for Android “master key” bug
Bluebox Security, the mobile security startup that’s “working to save the world from information thievery”, has made a name for itself by finding and …
Feds asked to avoid DEF CON this year
Jeff Moss (aka “The Dark Tangent”), founder and director of the Black Hat conference and DEF CON, has officially announced that employees of US federal agencies …
Featured news
Resources
Don't miss
- Building a healthcare cybersecurity strategy that works
- AI-generated images have a problem of credibility, not creativity
- The five-minute guide to OT cyber resilience
- Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
- Apple offers $2 million for zero-click exploit chains