Coud-based security service for iOS devices
Websense released the new TRITON Mobile Security solution, a cloud-based security service for iOS devices on wireless mobile networks. It combines four key elements for …
vCat for Mobile: Mobile network emulation tool
Shunra announced vCat for Mobile, a network virtualization and application performance engineering solution designed specifically to help organizations test, validate, and …
Tenable Network Security updates vulnerability management solution
Tenable Network Security announced SecurityCenter Continuous View, a vulnerability management solution that provides real-time, continuous vulnerability, configuration, and …
Week in review: Gizmodo, Reuters, Blizzard hacks, and the underground economy of social network
Here’s an overview of some of last week’s most interesting news and articles: “Microsoft support” scammers still cold calling users The old …
Free cleanup tool for Morcut malware targeting Macs
MacClean is a free clean-up solution designed for Apple fans that may be infected by the Morcut malware. Once downloaded, this easy-to-use tool scans your Mac and alerts you …
Andy Murray is the most dangerous British athlete in cyberspace
Tennis player Andy Murray has topped a list of the most dangerous British athletes to search for on the web, according to McAfee. Following on from the annual McAfee Most …
Blizzard confirms hack, urges users to change passwords
Blizzard’s CEO Mike Morhaime has confirmed in a letter that the company’s internal network has been breached this week. The “unauthorized and illegal …
Stuxnet cousin able to attack industrial control systems
Today, extensive analysis on a new cyber espionage weapon dubbed “Gauss’ has been released, stating that the tool has capabilities to attack national critical …
Microsoft to release nine bulletins on Tuesday
For the second month running, Microsoft’s Patch Tuesday Advanced Notification includes nine bulletins. This month, five are rated “critical’ and four …
NIST updates guide for dealing with computer security incidents
The National Institute of Standards and Technology (NIST) has published the final version of its guide for managing computer security incidents. Based on best practices from …
Performance tuning Windows Server 2012
Microsoft released a comprehensive paper that describes important tuning parameters and settings that you can adjust to improve the performance and energy efficiency of the …
Insight on social software and big data analytics
Teradata and Mzinga announced the results of a recent industry survey exploring the use of social technologies and big data analytics in business. The survey’s primary …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous