Microsoft releases nine comprehensive security bulletins
Microsoft released nine comprehensive security bulletins as part of its regular update cycle. At the top of the Microsoft list is another MSCOMCTL related bug. Last patched in …
Website analyzes and rates convoluted Terms of Service
When signing up for an online service, users are required to read and agree to the presented Terms of Service (ToS). But these terms often go on and on, and are written in …
Who is using the commercial cyberespionage tool FinFisher?
Malware development has long stopped being the exclusive domain of individuals and groups looking for strictly fame or money. As years passed and everybody and everything went …
BackTrack 5 R3 released
BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to …
Imation updates line of hardware encrypted USB hard drives
Imation announced the expansion of its secure USB hard drive line with capacities of up to 1 terabyte (TB), optional biometric fingerprint authentication, and a set of options …
Facebook deceived developers and users with Verified Apps program
The privacy settlement that the US Federal Trade Commission and Facebook agreed on last November has been finalized on Friday and, unlike Google earlier that week, Facebook …
BYOD reality: Missing mobile device usage policies
Gone are the days when employees only used a company-issued phone or laptop for work. Today, employees bring personal smartphones and tablets to the office and often have …
Citadel Trojan targets airport employees with VPN attack
Trusteer have recently discovered a sophisticated Man in the Browser (MitB) enterprise attack that targets VPN users at a major international airport hub. Using the Citadel …
Sophos helps businesses embrace BYOD
Sophos announced the latest version of its mobile device management (MDM) solution, Sophos Mobile Control 2.5. With an updated web-based administrative console and new feature …
Tips for college students to deter identity theft
Research from Javelin Research & Strategy identifies 18-24 year olds as consumers who are most likely to engage in risky electronic behavior. From public Wi-Fi through …
Behavior-based fraud prevention for ACH transactions
Guardian Analytics announced FraudMAP ACH. Using the same behavior-based anomaly detection technology proven to prevent fraud at hundreds of banks and credit unions in the …
What’s so special about Gauss?
Kaspersky Lab experts have recently notified the world of the existence of another piece of malware that seems to have come from the same workshop(s) that pushed out Stuxnet, …
Featured news
Resources
Don't miss
- PortGPT: How researchers taught an AI to backport security patches automatically
- AI can flag the risk, but only humans can close the loop
- VulnRisk: Open-source vulnerability risk assessment platform
- Connected homes: Is bystander privacy anyone’s responsibility?
- Google says 2026 will be the year AI supercharges cybercrime