Nmap 6.25 released
Nmap is a free and open source utility for network exploration or security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the …
Shylock’s new trick for evading malware researchers
Shylock is a financial malware platform discovered by Trusteer in 2011. Like most malware strains, Shylock continues to evolve in order to bypass new defensive technologies …
Mobile and cloud developments will dominate 2013
For the past several years, the IT industry’s transition to the 3rd Platform, built on mobile computing, cloud services, social networking, and big data analytics …
Metaforic releases software protection technology
Metaforic unveiled several new technology advancements that make it easier for software creators to protect a wide range of software (mobile, embedded, desktop, server) …
AVG releases Safe Browser for iOS, updates AntiVirus for Android
AVG updated its AntiVirus for Android and launched the new AVG Safe Browser for iOS. The main eye catcher in AVG AntiVirus for Android version 3.0.2 is the new user interface. …
Mobile communications hub with embedded encryption
API Technologies announced the new SST Secure Communications Hub (SCH) with integrated encryption. The SB1500ER Secure Communication Hub is a single, integrated device that …
Trend Micro cloud security optimized for Amazon Web Services
Amazon Web Services (AWS) customers are able to take advantage of optimized security solutions from Trend Micro for their AWS deployments, including the AWS Storage Gateway. …
UN atomic energy agency confirms breach into its server
It has been confirmed that the email addresses recently leaked by anti-Israel hacker group “Parastoo” have been stolen from a server belonging to the International …
Bogus Amazon account compromise notice leads to phishing
A phishing email impersonating Amazon is hitting users’ inboxes, trying to trick them into believing that various computers connected to their Amazon account and …
Essential safe shopping tips
Based on Kaspersky Lab’s world-wide insight into malicious software and online scammers, the company offers the following 10 warnings and tips for online shoppers: …
Unencrypted payment data on business networks at 70%
SecurityMetrics published its second annual Payment Card Threat Report revealing unencrypted PAN (Primary Account Number) storage remains alarmingly high. Virtually no change …
Top 5 security threats for 2013
The Information Security Forum announced their forecast of the top five security threats businesses will face in 2013. Key threats include cyber security, supply chain …
Featured news
Resources
Don't miss
- Cybersecurity and the development of software-defined vehicles
- Ransomware is up, zero-days are booming, and your IP camera might be next
- AI in the SOC: Game-changer or more noise?
- CISOs say they’re prepared, their data says otherwise
- Millions of Dell laptops could be persistently backdoored in ReVault attacks