Please turn on your JavaScript for this page to function normally.
Sudoku puzzle generating spreadsheet carries malware

Sudoku lovers, beware! Your love for solving the popular puzzle could just be the right entrance point cyber criminals need to saddle you with information-stealing malware. …

Lancope releases new threat intelligence for detecting attacks

Lancope released new threat intelligence for monitoring global cyber attacks. Through its StealthWatch Labs Intelligence Center (SLIC), Lancope is now delivering two new …

WatchGuard enhances XCS security appliances

WatchGuard Technologies announced the availability of its enhanced Extensible Content Security (XCS) solutions for SMBs. The XCS 580 and XCS 280 provide the same trusted …

Forensic access to encrypted BitLocker, PGP and TrueCrypt containers

ElcomSoft released Elcomsoft Forensic Disk Decryptor, a forensic tool providing access to information stored in disks and volumes encrypted with BitLocker, PGP and TrueCrypt. …

“Facebook 2013 Demo app” leads to phishing

The offer of an app that supposedly allows users to view a new version of Facebook is the newest trick employed by phishers to get their hands on the users’ login …

Will the Sweet Orange exploit kit dethrone Blackhole?

There’s a new exploit kit being offered for sale and it seems to be slowly but surely gaining in popularity. Dubbed Sweet Orange, the kit uses exploits for Java, PDF, IE …

Online reputation management tips

AVG announces twelve tips for individuals to safeguard their reputations while engaging in heightened e-commerce and social media activities during the holidays. …

Cloud exploits and mobile device attacks on the horizon

Although many security experts predict that the most likely data breach threats organizations will face in 2013 include cloud exploits, mobile device attacks and all-out cyber …

Exploits, security threats and hacks will mutate in 2013

Lamar Bailey, Director of Security Research and Development with nCircle, has released his top five security threats to watch out for in 2013. The New Year – and beyond …

88% of corporate databases vulnerable to cybercrime

GreenSQL revealed that 88 percent of all companies participating in its December survey do not protect their databases from both external and internal threats, and almost one …

Compliance auditing with in-depth reporting

Paws Studio is the compliance auditing tool for workstations and servers which enables organizations to produce intelligent compliance reports. It includes pre-defined …

Secure stateless tokenization for enterprises

Voltage Security announced its Stateless Tokenization (SST) technology, a patent-pending data security solution that provides enterprises, merchants and payment processors …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools