French hacker arrested for creating, spreading SMS Trojan
A 20-year-old from Amiens, France, has allegedly managed to steal around half a million of euros (over $650,000) by creating and distributing a Trojan disguised as legitimate …
Newest Apple Java update kills the Java browser plug-in
Determined not to fall behind on its Java updates, Apple has issued the latest one on Tuesday, the very same day that Oracle pushed out its own. But the big news isn’t …
Multi-platform attack site discovered via fake Lookout Android app
Researchers from security firm TrustGo have recently spotted on Google Play a bogus app that supposedly automatizes the updating of a batch of other apps. What piqued their …
Fake KLM e-tickets lead to malware
If you have recently booked a flight with KLM, please be careful when reviewing emails that appear to have been sent from the airline carrier, as rather legitimate-looking …
Data security and privacy stopping cloud implementations
Data security, privacy, residency, and compliance issues continue to hinder cloud adoption, with 66 percent of organizations reporting at least one cloud project that has been …
Enterprise IT supply chains will be compromised
Enterprise IT supply chains will be targeted and compromised, forcing changes in the structure of the IT marketplace and how IT will be managed moving forward, according to …
Self-service password management in the cloud
Ilantus released Password Express, a self-service password management solution with security and enterprise integration. It can be deployed in the cloud or on premise to meet …
Tips for protecting your privacy
Every month more than 5,000 people take to Twitter to complain about how their mobile device has been snooped on or their visual privacy invaded. Who can’t resist …
Dell unveils new enterprise vision
Dell announced plans to help businesses globally adopt modern, standards-based data center technologies that enable them to realize repeatable results and superior value at …
Windows 8 Administration Pocket Consultant
Portable and precise, this pocket-sized guide delivers ready answers for administering computers running Windows 8. Zero in on core operations and daily tasks using …
ModSecurity 2.7.0 released
ModSecurity makes full HTTP transaction logging possible, allowing complete requests and responses to be logged. Its logging facilities also allow fine-grained decisions to be …
Check Point unveils security appliance with 110GB/s throughput
Check Point launched its new 21600 Appliance that provides throughput of up to 110 Gbps, a 30 percent boost in SecurityPower units (SPUs) and ultra-low latency for …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)