Premium rate phone firms heavily fined for typosquatting
PhonepayPlus, the regulatory body for all premium rate phone-paid services in the UK, has ordered two Amsterdam-based companies to pay a fine of 100,000 pounds each and to …
Thwarting attacks with genetically-inspired computer configuration systems
In the seemingly unending search for computer security solutions that are both reactive and proactive, researchers have occasionally turned to other sciences for ideas. In …
Social mobile apps found storing users’ contacts without permission
A week ago, app developer Arun Thampi made public his discovery that Path – a popular iOS app that allows users to keep a journal of their everyday life and share it …
What is Gatekeeper in OS X Mountain Lion
The next version of OS X called Mountain Lion will be available this summer. Among the many new features, it will come with Gatekeeper that will help prevent users from …
Malicious sites increase 240%
In 2011, the most significant evolution in the threat landscape was the use of malware networks, or malnets, to launch highly dynamic Web-based attacks, according to Blue Coat …
Nessus 5.0 vulnerability scanner released
Tenable Network Security announced Nessus 5.0, a vulnerability and configuration assessment solution for enterprises and security professionals. Nessus 5.0 delivers introduces …
Trend Micro secures PlayStation Vita gamers
Trend Micro extended its collaboration with Sony and is now offering two web security services – “Trend Micro Kids Safety” and “Trend Micro Web …
Web-based breach tool for healthcare IT
Healthcare has become one of the most-breached industries, placing hospitals, clinics and health plans under scrutiny of the Department of Health and Human Services (HHS) …
Secure data with cloud-based encryption
Porticor introduced its Virtual Private Data (Porticor VPD) system, a solution combining data encryption with patented key management to protect critical data in public, …
The Internet of Things: Key Applications and Protocols
The Internet of Things describes the Home Area Networking, Building Automation and AMI protocols and their evolution towards open protocols based on IP such as 6LowPAN and …
The rise of information stealers and pay-per-install malware
The fastest growing malware categories in the second half of 2011 were PPI (Pay-Per-Installs) and information stealers that target user credentials enabling the theft of key …
The new and improved Kelihos botnet
As announced by Kaspersky Lab researchers and confirmed by Microsoft, the C&C and backup infrastructure of the original Kelihos/Hlux botnet is still down after their …
Featured news
Resources
Don't miss
- A new way to think about zero trust for workloads
- Heisenberg: Open-source software supply chain health check tool
- Securing real-time payments without slowing them down
- Unpatched Windows vulnerability continues to be exploited by APTs (CVE-2025-9491)
- CISA and partners take action as Microsoft Exchange security risks mount