Ultra-secure memory sticks with anti-malware features
Kingston Digital has partnered with ESET and ClevX. The combination extends ClevX DriveSecurity powered by ESET’s proactive portable anti-malware technology to …
Panda Cloud Antivirus 2.1 released
Panda Security launched Panda Cloud Antivirus 2.1. The product incorporates new anti-exploit technologies, in both its free and pro editions, which detect and neutralize …
Former Anonymous spokesman indicted for sharing stolen card data
After having been arrested last September and having been detained in custody ever since, 31-year-old Barrett Brown has finally been indicted for possessing and transmitting …
Hackers encrypt medical centre’s patient data, ask for ransom
Russian hackers have apparently managed to break into a server where an Australian medical centre keeps its patients’ records, encrypt the data, and are now asking for …
Team GhostShell leaks 1.6M account details
Hacker collective Team GhostShell, which has recently specialized in massive data leaks, has done it again and made public 1.6 million account details allegedly stolen from …
200,000 new malicious programs detected every day
Kaspersky Lab released its annual Kaspersky Security Bulletin, which provides the overall malware and cyber-threat statistics for 2012. The report revealed significant growth …
Most prevalent threat detections of the holiday season
In November, GFI threat researchers encountered email threats disguised as notices from American Express, DHL and UPS as the holiday season kicked into full gear, as well as a …
Multipurpose Necurs Trojan infects over 83,000 computers
The polivalent Necurs malware family has been wreaking havoc in November by infecting over 83,000 unique computers – and that are only the ones detected by …
Beware of Bitcoin miner posing as Trend Micro AV
Malware almost always comes in disguise, but some malware peddlers try to do a better job than others. Trend Micro researchers have recently uncovered a piece of malware that …
Proprietary platforms to cause complexity in 2013
Citrix predicts that the rise of consumerisation and the Bring-Your-Own (BYO) phenomenon will force IT departments to focus on the challenge of apps and data governance. 2012 …
Reflecting on 2012: Cyberwar, next generation firewalls and compliance
Historically security products have been developed either in response to, or in anticipation of, major shifts in enterprise computing – or at least that’s been my …
Motives behind IT budget spend and 2013 cloud trends
A global survey of 550 CIOs, IT Directors, and senior IT managers has confirmed motives behind their IT budget spend in 2012, while revealing the rate of cloud adoption in …
Featured news
Resources
Don't miss
- Security tooling pitfalls for small teams: Cost, complexity, and low ROI
- BloodHound 8.0 debuts with major upgrades in attack path management
- Back to basics webinar: The ecosystem of CIS Security best practices
- SonicWall firewalls targeted in ransomware attacks, possibly via zero-day
- AIBOMs are the new SBOMs: The missing link in AI risk management