IEEE approves revision of wireless LAN standard
IEEE announced the publication of IEEE 802.11-2012, which defines the technology for the world’s premier wireless LAN products. The new IEEE 802.11-2012 revision has …
Is a German criminal behind the latest ransomware campaign?
Ransomware distribution campaigns are coming fast one after the other and its usually difficult – if not downright impossible – to discover anything about the …
Ransomware increases in prevalence as cyber-criminal tactic
In the first quarter of 2012 alone, six million new malware samples were created, following the trend of increasingly prevalent malware statistics of previous years, according …
Adobe patches Flash Player hole exploited in the wild
Adobe has released a security update for Flash Player for Windows, Macintosh, Linux and Android that address the object confusion vulnerability (CVE-2012-0779) that is …
Phishers mimic OpenID to steal credentials
New spam email campaigns are taking advantage of the users’ vague familiarity with the OpenID authentication method to phish their login credentials for a number of …
Situational awareness platform uses power of big data
Despite all the promises made by SIEM vendors over the last decade, enterprise security analysts often have no way to know if their IT systems have been compromised by an APT …
Windows applications on iOS
GraphOn announced its GO-Global iOS client. Available immediately as a free downloadable app from the App Store, the new client is used in conjunction with GraphOn’s …
NetShade 5: Anonymous proxy for the Mac
NetShade makes your presence on the web anonymous by routing your connection through a proxy server. It keeps you from leaving your digital “calling card” at every …
Theory of Computation
Offering an accessible approach to the topic, Theory of Computation focuses on the metatheory of computing and the theoretical boundaries between what various computational …
Week in review: Sizing up botnets, Conficker still alive and kicking, and a new exploit kit spotted in the wild
Here’s an overview of some of last week’s most interesting news, podcasts and articles: What’s in your daily slice of spam? Bitdefender decided to look at …
Walmart gift card scam targets smartphone users
Online survey scams are most often propagated through social network and sharing websites, but occasionally users are “assaulted” directly through their …
Microsoft to release seven bulletins, three critical
The Microsoft Security Bulletin Advance Notification for May 2012 contains 7 bulletins: three rated “critical” and the rest “important.” Just when most …
Featured news
Resources
Don't miss
- Fortinet warns about FortiSIEM vulnerability with in-the-wild exploit code (CVE-2025-25256)
- AWS CISO explains how cloud-native security scales with your business
- Product showcase: Apricorn Aegis NVX, a high-security, portable SSD
- How to build and grow a scalable vCISO practice as an MSP
- Global OT cyber risk could top $329 billion, new report warns