Sophos releases free anti-virus app for Android
Sophos announced Sophos Mobile Security, a free lightweight anti-virus app that protects Android devices against malware, privacy issues and hardware loss – without …
Email from disgruntled buyer leads to eBay phishing page
In these hard economic times, many have turned to eBay for selling things in order to earn a buck. But, in order to be trusted by buyers, the sellers depend on good ratings …
1,500 severe security events detected on Black Hat WLAN
The WLAN network at Black Hat was accessed by 3,155 attendees with a maximum of 904 simultaneous clients, detected and quickly contained a total of 1,561 severe independent …
Tumblr and Twitter users targeted with oddball spam messages
A bizarre spam campaign touting free McDonalds gift cards has recently been spotted on compromised Tumblr and Twitter accounts: According to GFI, the link included in the spam …
Wargame examines the future of US infrastructure
Booz Allen Hamilton concluded the first-ever wargame simulation examining creative infrastructure initiatives and solutions that factor in US transportation needs by the year …
Security storage app for iOS and Android devices
TrustPort launched Portunes, a freeware security storage app that runs on iOS and Android devices. Portunes is an application protecting sensitive data like informationon …
The Computer Incident Response Planning Handbook
The Computer Incident Response Planning Handbook is derived from real-world incident response plans that work and have survived audits and repeated execution during data …
Week in review: Hidden security risks of top mobile apps, Facebook invites white hats to attack its networks
Here’s an overview of some of last week’s most interesting news, articles and reviews: Penetration testing tool masquerades as surge protector In the same way that …
Researchers beat Google’s Bouncer
When earlier this year Google introduced Bouncer – an automated app scanning service that analyzes apps by running them on Google’s cloud infrastructure and …
Facebook invites white hats to attack its corporate network
Nearly a year ago, Facebook introduced its bug bounty program, inviting security researchers to poke around the site, discover vulnerabilities that could compromise the …
Personal and financial information under attack
Cybercriminals have increased their focus in targeting individuals and organizations of all sizes to steal personal and financial information according to Trend Micro. Among …
Most users think content is more important than the device
A global F-Secure survey of broadband subscribers has identified security, privacy and issues relating to the storing and sharing of digital content as key concerns. The …
Featured news
Resources
Don't miss
- Brute-force attacks hammer Fortinet devices worldwide
- For $40, you can buy stolen police and government email accounts
- Vulnerabilities in MSP-friendly RMM solution exploited in the wild (CVE-2025-8875, CVE-2025-8876)
- AI security governance converts disorder into deliberate innovation
- Open-source flow monitoring with SENSOR: Benefits and trade-offs