Android gets safer with full ASLR implementation
Last week’s release of Jelly Bean (v 4.1+), the latest version of Google’s Android, was a big step for the company security-wise, as the hugely popular mobile …
Panda Cloud Antivirus 2.0 released
Panda Security launched Panda Cloud Antivirus 2.0 for both its Free and Pro editions. The new version is fully compatible with Windows 8 Release Preview and incorporates a new …
Send messages with file attachments in a secure environment
TigerText introduced the ability to send file attachments today through an API integration with Dropbox. TigerText users will now be able to securely and instantly send PDF, …
Sophos delivers complete security in a box
Sophos announced Sophos UTM 9, specifically designed to integrate gateway security and endpoint security in a single hardware or virtual box. It provides complete security …
Blue Coat delivers mobile application controls
Blue Coat introduced mobile application controls that close the security gap created by unsanctioned mobile applications on the corporate network. The growth in bring your own …
Check Point simplifies security for private clouds
Check Point introduced Check Point Virtual Systems, that allow customers to secure multiple network segments by selecting any combination of Check Point software blade …
Norman updates Malware Analyzer G2 platform
Norman announced the new version of its Malware Analyzer G2 platform which delivers to analysts the latest automated analysis tools. Malware Analyzer G2 Version 3 delivers: …
Scareware targets users infected with industrial espionage worm
ACAD/Medre.A, a worm that steals AutoCAD drawings and sends them to remote servers, was recently discovered infecting a great number of computers in Peru and some other Latin …
ASUS eStore allegedly hacked
Another day, another data breach, another password dump. Softpedia reports that NullCrew, a hacker group that claimed responsibility for the recent PBS and World Health …
Yahoo! closes security hole that led to huge password breach
Yahoo! has patched the security hole that allowed hackers to access some 450,000 email addresses and passwords associated with Yahoo! Contributor Network and ultimately …
How to make smart grids
A smart grid is an upgraded electricity network with two-way digital communication between supplier and consumer. The adoption of smart grids will change the distribution and …
The growing headache of protecting mobile devices
33 per cent of UK organizations foresee the protection of mobile devices in the workplace to be the biggest security headache they will encounter in the year ahead, according …
Featured news
Resources
Don't miss
- Brute-force attacks hammer Fortinet devices worldwide
- For $40, you can buy stolen police and government email accounts
- Vulnerabilities in MSP-friendly RMM solution exploited in the wild (CVE-2025-8875, CVE-2025-8876)
- AI security governance converts disorder into deliberate innovation
- Open-source flow monitoring with SENSOR: Benefits and trade-offs