Ex-CME programmer admits to stealing source code
A former senior software engineer for Chicago-based CME Group pleaded guilty to theft of trade secrets for stealing computer source code and other proprietary information …
Key components for mobile device management of BYOD
The Cloud Security Alliance (CSA) Mobile Working Group released a research report identifying 17 key elements that are critical for organizations to consider for the full …
Moving federal mission-critical applications to the cloud
As federal agencies are making cloud progress, the early-adopters that are moving their mission-critical applications to the cloud are realizing cost savings and improved …
SUSE Manager update streamlines Linux management
SUSE released SUSE Manager 1.7 of its systems management solution for enterprise Linux environments. SUSE Manager’s capabilities help enterprises to comprehensively …
ActivClient Mobile SDK for iOS released
HID Global released the ActivClient Mobile SDK for iOS. Application developers, enterprises, government entities and other organisations will benefit from this SDK with …
Fake debt payment notices deliver malware
Emails purportedly coming from PayPal’s Bill Me Later service have been hitting inboxes around the world, threatening to file charges against the users if they do not …
Manage firewall policies by applications with SecureApp
Tufin Technologies released SecureApp, developed to address what firewall administrators cite as one of their biggest challenges: managing the network connectivity of …
Comodo updates its Endpoint Security Manager
Comodo released a new edition of Comodo Endpoint Security Manager designed to assist businesses with locking down and centrally managing their laptop, desktop and server …
Secure smart card reader for government applications
Belkin announced the first USB smart card and common access card (CAC) reader specifically designed for government applications. Offering the broadest range of smart card …
Lucrative ZeroAccess botnet enslaves one million active computers
The ZeroAccess rootkit has been around for quite some time now, spying on infected users, hiding from installed AV solutions and attempting to terminate them, redirecting …
Twitter messages lead to phishing AND malware
If you have received a private message from another Twitter telling you “lol ur famous now”, have followed it to a fake Facebook page requiring you to log into …
Pinterest users targeted with fake ad-pushing app
Pinterest, the extremely popular pinboard-style social photo sharing website, has launched official apps for Android, iPad and iPhone back in April, but that hasn’t …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware