Mounting risks from mobile devices in the enterprise
At RSA Conference Europe 2012, RSA released a new research report from the Security for Business Innovation Council (SBIC) that addresses the continued surge of consumer …
Array Networks unveils secure access gateway virtual appliance
Array Networks announced its new vxAG Virtual Secure Access Gateway virtual appliance for cloud and virtualized environments. The new product gives enterprises and service …
Rapid7 acquires Mobilisafe
Rapid7 has acquired Mobilisafe, a Mobile Risk Management (MRM) provider, and entered a new market with its solution for managing the risk associated with Bring Your Own Device …
Microsoft patches 20 vulnerabilities
Microsoft Security Bulletin Summary for October 2012 contains 7 bulletins to patch 20 vulnerabilities. MS12-064, rated at critical, affects Microsoft Word and would allow an …
Ransomware adds audio component to force users to pay up
Not satisfied with just showing the fake FBI note, the criminals behind one of the many ransomware campaigns going on at the moment are trying to assault the users’ …
Massive WoW killing spree due to in-game exploit
What should have been a relaxing and afternoon in the virtual world of Azeroth turned to a veritable bloodbath as unknown hackers used a still unknown exploit to kill off …
Proxy service users download malware, unknowingly join botnet
In yet another example of if-it’s-too-good-to-be-true-it-probably-isn’t, hundreds of thousands of users signing up for a cheap and supposedly legitimate proxy …
Surge in Android adware
Between the beginning of July and the end of September, FortiGuard Labs researchers reported a marked increase in Android adware, new evidence suggesting that Zitmo …
Cybercrime costs rise nearly 40 percent
HP today unveiled new research indicating that the cost and frequency of cybercrime have both continued to rise for the third straight year. According to the third annual …
Trend Micro introduces defense against targeted attacks
Trend Micro is introducing Custom Defense – an advanced threat protection solution that enables businesses and government agencies not only to detect and analyze APTs …
New TDL4 rootkit successfully hiding from AV
A new variant of TDL4 has been identified, and it is now ranked as the second most prevalent malware strains within two months since detection. The characteristics are similar …
Penetration testers need to advance their skills
Ahead of SANS London 2012, Europe’s largest IT security training event, a top security expert and trainer is warning that a big challenge and knowledge gap for …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)