Please turn on your JavaScript for this page to function normally.
Detect and shut down rogue mobile apps

To counter the emergence of malicious and unauthorized apps appearing on mobile app stores, RSA introduced the RSA FraudAction Anti Rogue App Service designed to detect and …

Broadcom introduces 5G WiFi combo chip for smartphones

Broadcom introduced the BCM4335, the first complete 5G WiFi combo chip for smartphones, tablets, ultrabooks and other mobile devices. 5G WiFi, the 5th generation of Wi-Fi …

First holistic security platform unveiled at Black Hat

AccessData released Cyber Intelligence & Response Technology 2 (CIRT 2), a platform that integrates network and computer forensics, malware analysis, large-scale data …

GFI VIPRE Mobile Security Premium now on Android devices

In addition to securing users from more than 10,000 known Android viruses, GFI VIPRE Mobile Security Premium helps them to keep their children safe, protect personal …

Crisis OS X Trojan is an effective spy tool

The Crisis/Morcut OS X malware recently discovered via samples submitted to VirusTotal is more than just a backdoor Trojan, Sophos researchers say after analyzing it. Its …

The dangers of Java and what to do about it

Since late 2010, Java exploits have become way more popular with hackers than the Adobe-related ones. The problem with Java is not so much in the newly discovered …

Qualys adds IPv6 support to FreeScan

Qualys announced at Security B-Sides Las Vegas that FreeScan – a popular free service that allows organizations to scan web sites or publicly facing IP addresses for …

Bogus Olympics ticket site spotted

If you’re looking to score tickets for Olympic events you should be extremely careful when buying them online, as fake ticket sites are still around. Take for example …

Cybercriminals use social engineering to extend lifecycle of malware

Android smartphone users remain a lucrative target as the platform currently has 59 percent global market share and is on track to stay the most shipped mobile operating …

Hidden security risks of top mobile apps

Appthority cast a spotlight on the hidden behaviors of the top free mobile apps. The report reveals the security issues raised by the BYOD movement, app market fragmentation …

What will the workplace of the future look like?

IT consumerization is dependent on an open-minded approach by organizations, and most likely to succeed with specific, pre-defined parameters, according to Dell and Intel. …

Location tracking becomes more attractive

In a GFI Software survey of more than 1,000 U.S. respondents, 12% say they would use location tracking to monitor their spouse’s whereabouts, while 31% of respondents …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools