Emerging threats to become major players in 2012
Emerging threats from 2011 are on track to become the major players for cyberactivity in 2012, including mobile banking, “legal” spam and virtual currency. McAfee …
Mac management tools from Google
Google’s internal Macintosh Operations team is starting to release the utilities, tools, and scripts for managing and tracking a fleet of Macintoshes in a corporate …
Pentagon officials allowed to use Android
US Department of Defense officials that need a mobile device are no longer restricted to using a BlackBerry, reports Muktware. The Pentagon has now also allowed the use of …
Anonymous targets security think tank, pilfers sensitive data
The hacking collective Anonymous has downed the website and stolen client information belonging to Stratfor (Strategic Forecasting Inc.), a US-based research group that …
Data-stealing malware growth spikes
The propagation of some forms of crimeware surged in the half-year period ending in June, 2011 with data-stealing malware reaching and maintaining a new plateau of contagion, …
What’s in store for us in 2012
Looking forward into what lies ahead for us in 2012, Zscaler offers predictions for the upcoming threat landscape. 1. Mobile: With WebOS now officially an orphan, Blackberry …
NAC system PacketFence 3.1.0 released
PacketFence is a fully supported, trusted, free and open source network access control (NAC) system. Boasting a feature set including a captive-portal for registration and …
Week in review: Mobile application security risks, holiday-themed scams, and reasons for ditching Java
Here’s an overview of some of last week’s most interesting news and podcasts: Windows 8 will have picture password sign in As much as security experts would like …
Ditching Java might be a good move
As unpatched Java vulnerabilities are frequently taken advantage by exploit kits and users often forget to update Java, F-Secure’s Mikko Hypponen says that maybe …
Researcher blasts Siemens for lying about SIMATIC bugs
The contentious issue of responsible and coordinated vulnerability disclosure has been revisited again as security researcher Billy Rios reacted to a statement made by Siemens …
Compliance data service from software piracy experts
To accelerate the identification of companies using unlicensed software, V.i. Labs announced a data service to automatically match license infringement records to a named …
Ways to avoid falling victim to scams
With the holiday season upon us, more companies are sending customers information about great deals for last-minute shopping. Unfortunately, among those exciting offers comes …
Featured news
Resources
Don't miss
- What Cloudflare’s 2025 internet review says about attacks, outages, and traffic shifts
- Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
- Kali Linux 2025.4: New tools and “quality-of-life” improvements
- How researchers are teaching AI agents to ask for permission the right way
- Prometheus: Open-source metrics and monitoring systems and services