Dedicated appliances for protection against DDoS
Fortinet introduced the FortiDDoS product family for enterprises, Web hosting and cloud service providers. The new FortiDDoS-100A, FortiDDoS-200A and FortiDDoS-300A are …
Network anomaly detection appliance by IBM
According to the 2011 IBM X-Force Trend and Risk Report, adversaries ramped up social engineering attacks, and X-Force witnessed mobile exploits having increased by 19 percent …
Macs harbor both Mac and Windows malware
Have the predictions made yearly by many security firms finally come true? Will Mac users be forced to invest in a good antivirus solution? According to the latest numbers …
First portable malware intelligence system
ValidEdge has unveiled a real-time malware analysis engine built into a standard laptop, delivering the power to analyze up to 1000 malware samples per day in a fully …
Google raises bug bounty to $20,000
Google has announced that it will be updating the rules for its bug bounty program and will start handing out bigger amounts to the researchers participating in it. According …
Web application attack report from FireHost
Secure cloud hosting company, FireHost, has revealed details about type and origin of web attacks that it has blocked from causing harm to clients’ web applications and …
Fake warning about Olympic-themed scams carries malware
It’s three months to go until the start of the London Olympics 2012, and sports fans are searching for and buying tickets to the various events online. Unfortunately, …
Russian cybercrime market doubles in size
Russian cybercrime investigation and computer forensics company and LETA Group subsidiary Group-IB released a 28-page report prepared by analysts from its computer forensics …
BYOD is both an opportunity and a threat
A survey titled “What is your approach to BYOD – Love it? Hate it?” and conducted among 316 IT and security professionals set out to assess the opinions of …
Users worry about data security, but still trust social networks
Although the majority of people (71 percent) are worried about the amount of personal information held online, a significant proportion would still share confidential …
Enterprise encryption with near zero overhead
Vormetric announced Vormetric Encryption V5, which significantly reduces the cost and application impact of encryption by using software enhancements and hardware encryption …
Enhanced security awareness for tablet users
Cryptzone unveiled the latest release of NETconsent Compliance Suite, its policy management software. Recognising how difficult it is to raise IT security awareness amongst an …
Featured news
Resources
Don't miss
- Cybercriminals exploit RMM tools to steal real-world cargo
- Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
- How nations build and defend their cyberspace capabilities
- Uncovering the risks of unmanaged identities
- Deepfakes, fraud, and the fight for trust online