Encrypt and protect virtual machine images
HighCloud Security unveiled VM-Centric Security, a solution to encrypt and protect virtual machine (VM) images and the data they contain throughout their lifecycle. The …
Week in review: 250,000 hacker conversations analyzed, making a cheap mobile malware jail and Stuxnet’s successor Duqu
Here’s an overview of some of last week’s most interesting news, articles, interviews and podcasts: Testing web applications for security flaws David Hoelzer is …
Skype can be used to tie users to illegal download activity
A team of researchers has proved that it is possible to determine the IP address of a user and tie it with his Internet use, and even correlate this information to his …
Bloody photos of Gaddafi used as bait in malware-laden email run
As predicted, the violent death of Libyan dictator Moammar Gaddafi has been taken advantage of by cyber criminals in order to trick gore-hungry users into downloading malware: …
Nasdaq attackers spied on companies
The systems of the company that operates the Nasdaq Stock Market were breached many times last year, but the actual trading platform was never compromised. A subsequent …
Anonymous proxy for iPhone and iPad
NetShade makes your web presence anonymous by routing your connection through a proxy server. NetShade is a subscription service. With an account, you can use the five …
Divorce is less stressful than safeguarding confidential data
How are IT managers coping with today’s threat landscape? Are they properly protected against the latest data-stealing malware? And would employees report if they …
rCloud: Disaster recovery for virtual environments
Doyenz announced rCloud, a disaster recovery solution for SMBs that offers recovery for virtual environments. Purpose-built for VMware virtualized environments, rCloud can …
Fraud detection and cloud security from ActivIdentity
ActivIdentity introduced 4TRESS Authentication Appliance that offers multi-layered strong authentication, fraud detection and cloud security capabilities. The appliance …
Flash bug allows spying of website visitors through webcam
A slight variation of a previously designed clickjacking attack that used a Adobe Flash vulnerability has once again made it possible for website administrators to …
Which mobile OS is most hit by malware?
As most mobile phone users still don’t have a mobile AV solution installed on their devices, it can be rather hard to gauge just how many of them have been hit by mobile …
Hijacked phishing page warns users about phishing
hen you follow security news daily like I do, it is tough to keep a positive outlook when day after day you hear and read of users falling for basically the same scams simply …
Featured news
Resources
Don't miss
- Building a healthcare cybersecurity strategy that works
- AI-generated images have a problem of credibility, not creativity
- The five-minute guide to OT cyber resilience
- Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
- Apple offers $2 million for zero-click exploit chains