Sweeping mobile phishing attack requests bank customers’ ID scans
A very thorough phishing campaign is targeting customers of JPMorgan Chase Bank who use their mobile phones to do their online banking, warn Trend Micro researchers. The …
Skyhigh Secure: Data security for information in the cloud
Skyhigh Networks announced Skyhigh Secure, a solution that enables organizations to address their critical cloud data protection requirements – including contextual …
AIAA releases framework for aviation cybersecurity
The American Institute of Aeronautics and Astronautics (AIAA) has released its decision paper “A Framework for Aviation Cybersecurity.” It outlines the existing …
Kaspersky updates its security solutions for home users
Kaspersky Lab released Kaspersky Anti-Virus 2014 and Kaspersky Internet Security 2014. Both products now include ZETA Shield antivirus technology, which performs an in-depth …
MS SQL Agent facilitates the collection of MSSQL audit records
SNARE for MSSQL allows a security administrator to remotely set up, control and monitor the application through a standard web browser and a self-contained installation …
Intigua: Automate the provisioning of management technologies
CIOs today are asking their IT teams to build private clouds that reflect the on-demand simplicity and agility that Amazon Web Services delivers in its public cloud. Unlike …
Microsoft releases critical fixes for IE and Exchange Server
There’s a remotely exploitable, publicly disclosed, critical remote code execution vulnerability in Microsoft Exchange (MS13-061)! But wait, is it really remotely …
Malicious ads lead to outdated adware-laden Firefox “update”
A series of Internet campaigns pushing bogus Firefox updates onto unwary users have been spotted by researchers, and among them is one that lures them in through “Green …
Multi-service authentication via palm vein images
Fujitsu has been creating and releasing palm vein biometric authentication and identification systems for over a decade, but have now presented a new one that definitely …
Google increases rewards for Chromium bug reports
It has recently been proved that setting up bug bounties is a cheaper option than hiring full-time bug hunters, and Google’s two bug bounty programs – Google Web …
Windows XP’s approaching retirement will be boon for blackhats
Windows XP, one of Microsoft’s most popular products ever, is scheduled to be retired in April 2014. This means that from that moment on, no updates patching security …
Obama’s “independent” intelligence review group selected by DNI Clapper
After his speech about transparency and greater oversight over US surveillance programs, as well as the announcement about forming an “independent”, …
Featured news
Resources
Don't miss
- Black Friday 2025 cybersecurity deals to explore
- Quantum encryption is pushing satellite hardware to its limits
- cnspec: Open-source, cloud-native security and policy project
- The privacy tension driving the medical data shift nobody wants to talk about
- Salesforce Gainsight compromise: Early findings and customer guidance