Detect and shut down rogue mobile apps
To counter the emergence of malicious and unauthorized apps appearing on mobile app stores, RSA introduced the RSA FraudAction Anti Rogue App Service designed to detect and …
Broadcom introduces 5G WiFi combo chip for smartphones
Broadcom introduced the BCM4335, the first complete 5G WiFi combo chip for smartphones, tablets, ultrabooks and other mobile devices. 5G WiFi, the 5th generation of Wi-Fi …
First holistic security platform unveiled at Black Hat
AccessData released Cyber Intelligence & Response Technology 2 (CIRT 2), a platform that integrates network and computer forensics, malware analysis, large-scale data …
GFI VIPRE Mobile Security Premium now on Android devices
In addition to securing users from more than 10,000 known Android viruses, GFI VIPRE Mobile Security Premium helps them to keep their children safe, protect personal …
Crisis OS X Trojan is an effective spy tool
The Crisis/Morcut OS X malware recently discovered via samples submitted to VirusTotal is more than just a backdoor Trojan, Sophos researchers say after analyzing it. Its …
The dangers of Java and what to do about it
Since late 2010, Java exploits have become way more popular with hackers than the Adobe-related ones. The problem with Java is not so much in the newly discovered …
Qualys adds IPv6 support to FreeScan
Qualys announced at Security B-Sides Las Vegas that FreeScan – a popular free service that allows organizations to scan web sites or publicly facing IP addresses for …
Bogus Olympics ticket site spotted
If you’re looking to score tickets for Olympic events you should be extremely careful when buying them online, as fake ticket sites are still around. Take for example …
Cybercriminals use social engineering to extend lifecycle of malware
Android smartphone users remain a lucrative target as the platform currently has 59 percent global market share and is on track to stay the most shipped mobile operating …
Hidden security risks of top mobile apps
Appthority cast a spotlight on the hidden behaviors of the top free mobile apps. The report reveals the security issues raised by the BYOD movement, app market fragmentation …
What will the workplace of the future look like?
IT consumerization is dependent on an open-minded approach by organizations, and most likely to succeed with specific, pre-defined parameters, according to Dell and Intel. …
Location tracking becomes more attractive
In a GFI Software survey of more than 1,000 U.S. respondents, 12% say they would use location tracking to monitor their spouse’s whereabouts, while 31% of respondents …
Featured news
Resources
Don't miss
- Brute-force attacks hammer Fortinet devices worldwide
- For $40, you can buy stolen police and government email accounts
- Vulnerabilities in MSP-friendly RMM solution exploited in the wild (CVE-2025-8875, CVE-2025-8876)
- AI security governance converts disorder into deliberate innovation
- Open-source flow monitoring with SENSOR: Benefits and trade-offs