Sophos unveils new unified threat management appliance
Sophos released a new unified threat management appliance and software package exclusively for small businesses. The Sophos UTM 100 appliance with BasicGuard sets a new …
Week in review: Facebook to educate new users on privacy, PayPal, Symantec targeted in hacking spree
Here’s an overview of some of last week’s most interesting news, videos, reviews, podcasts and articles: Life cycle and detection of an exploit kit This talk …
New QuickTime fixes a number of security vulnerabilities
In a new security advisory, Apple addressed a number of vulnerabilities in QuickTime for Windows and announced a new version – 7.7.3. This is the list of security …
Social networking is the #1 risk to information security
The consumerisation of IT has made security far more difficult to manage according to research published by McAfee at its Security Summit in London. This is exemplified by the …
Trusted deployment of personal data to boost growth in the European economy
The effective and trusted deployment of personal data could be a boon to consumers and a source of massive growth in the European economy, but only if public and private …
Updated SkyBox risk and compliance management solutions
Skybox Security added new capabilities to Firewall Assurance 6.5 and Network Assurance 6.5 that make it easier for security managers to see, analyze and take action to secure …
Symbian malware scene far from dead
F-Secure recently released the latest version of their Mobile Threat Report which covers Q3 2012. This is the executive summary related to Symbian threats. Despite …
Android malware continues to dominate the mobile threat landscape
F-Secure recently released the latest version of their Mobile Threat Report which covers Q3 2012. This is the executive summary related to Android threats. As expected, …
New IronKey hardware-encrypted secure flash drives
Imation Corp. announced the availability of two new IronKey hardware-encrypted rugged flash drives – S250 and D250 . The IronKey flash drives deliver powerful protection …
IT in the organization: four possible scenarios for the future
The changing shape of IT is causing CIOs to question the role of IT in the organization. As businesses confront global economic uncertainty, changing market dynamics and …
Adobe Reader 0-day exploit sold for $50,000
The good news is that the exploit costs $50,000 which limits the purchase of it to defense contractors, nation states and some criminal organizations that may be able to …
Video demonstration: New Adobe Reader zero-day exploit
Russian based security company Group-IB announced a new zero day vulnerability in Adobe Reader 10 and 11. According to their research, the exploit bypasses Reader’s …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)