F-Secure Mobile Security protects Android TVs and set-top boxes
F-Secure launched a new version of F-Secure Mobile Security which features support for standard Android devices including TVs and set-top boxes. The new version also comes …
Malicious phpMyAdmin served from SourceForge mirror
A malicious version of the open source Web-based MySQL database administration tool phpMyAdmin has been discovered on one of the official mirror sites of SourceForge, the …
Researcher shows Samsung Galaxy S3 remote data-wipe hack
At the recently held ekoparty Security conference in Buenos Aires security researcher Ravi Borgaonkar has demonstrated a simple attack that could lead to a remote wiping of …
Critical Java flaw affects nearly one billion users
Researchers from Polish firm Security Explorations keep digging into Java and discovering flaws, the latest of which has been unearthed just before Oracle’s annual …
Researchers bypass NFC access control with smartphone
A security flaw in most Mifare NFC contactless cards can easily be misused by hackers to modify the contents of the cards and get free rides on at least two U.S. transit …
eIQnetworks releases next generation SIEM
eIQnetworks announced SecureVue NGS, a next-generation SIEM solution that provides log management, event management, network behavioral analysis and intelligent security …
Bogus Second Life survey leads to card info theft
Users of popular online virtual world Second Life are in danger of getting their credit card details stolen via phishing pages that supposedly offer 2500 Linden dollars …
Mobile banking trends and hidden risks
While mobile banking apps are growing quickly in popularity, 68 percent of smartphone owners who have not yet adopted these apps are holding back due to security fears, while …
Solutions for application and network performance management
AppNeta launched its unified solutions for End User Experience Monitoring including full-stack application performance tracing and network performance insight. As business …
DellKACE unveils appliance for improved endpoint security
Dell KACE unveiled the latest version of the Dell KACE K1000 Management Appliance, which includes expanded visibility into the network through support for new operating …
Top words cybercriminals use in fake emails
The top words cybercriminals use create a sense of urgency, to trick unsuspecting recipients into downloading malicious files. The top word category used to evade traditional …
Ethics of Big Data
What are your organization’s policies for generating and using huge datasets full of personal information? Ethics of Big Data examines ethical questions raised by the …
Featured news
Resources
Don't miss
- EntraGoat: Vulnerable Microsoft Entra ID infrastructure to simulate identity security misconfigurations
- Win-DDoS: Attackers can turn public domain controllers into DDoS agents
- How Brandolini’s law informs our everyday infosec reality
- From legacy to SaaS: Why complexity is the enemy of enterprise security
- Review: From Day Zero to Zero Day