Con artists love social networks
Most social networks’ users are hit by online scams almost daily – whether its the ubiquitous survey scam or the “share your cell phone number, get …
New versions of Trend Micro enterprise data protection software
Trend Micro now offers completely integrated data protection for messaging and collaboration systems providing many feature advantages for security professionals. ScanMail for …
Smartphone and tablet security tips
ICSA Labs is offering a series of tips that businesses and consumers can use to protect themselves from security risks aimed at smartphones, tablets and apps. 1. Only buy apps …
Data seepage from the corporate boundary
In a growing number of cases, Internet-facing business systems do not always reflect a well maintained, up-to-date security profile, and, as one would expect they are, by …
Japanese defense contractor breached
Mitsubishi Heavy Industries has revealed that its networks have been breached in what is considered the first cyber attack to hit Japan’s defense industry. According to …
Week in review: Windows 8 security features, the end of DigiNotar and BIOS rootkit in the wild
Here’s an overview of some of last week’s most interesting news: Linux Foundation suffers security breach A few weeks after the discovery of the compromise of the …
Leaked psychological profile of Anonymous leaders is a fake
The FBI has confirmed that the recently “leaked” psychological profile of Anonymous/Lulzsec leaders supposedly compiled by the Bureau is fake, and likely a prank …
Spammers exploit confusion over revoked SSL certificates
It was only a matter of time until cyber crooks would begin taking advantage of the DigiNotar breach and the news of the revocation of many of its certificates to trick users …
Most dangerous celebrities in cyberspace
Heidi Klum has replaced Cameron Diaz as the most dangerous celebrity to search for on the Web, according to McAfee. For the fifth year in a row, McAfee researched popular …
Bing, Yahoo! serving malware for popular search terms
Bing results for popular search terms such as “Firefox/Skype/AdobePlayer/uTorrent download” have been poisoned with bogus websites pushing a variety of malware. On …
Evolving cyber threats continue to drive security strategy
43 percent of global companies think they have an effective information security strategy in place and are proactively executing their plans, placing them in the category of …
NFC-enabled BlackBerry smartphones will “open doors”
HID Global plans to support the company’s iCLASS digital keys and mobile secure identity on NFC-enabled BlackBerry smartphones. The new BlackBerry Bold 9900/9930 and …
Featured news
Resources
Don't miss
- How FinTechs are turning GRC into a strategic enabler
- Secretless Broker: Open-source tool connects apps securely without passwords or keys
- Product showcase: Protect your data with Apricorn Aegis Secure Key 3NXC
- Microsoft introduces protection against email bombing
- Sudo local privilege escalation vulnerabilities fixed (CVE-2025-32462, CVE-2025-32463)