Please turn on your JavaScript for this page to function normally.
Facebook spammers trick users into sharing anti-CSRF tokens

Facebook spammers have already used a number of different approaches to make users inadvertently propagate their scams, and most of them fall into the social engineering …

Endpoint Protector 4 released

CoSoSys released a new version of their flagship device control and data loss prevention solution, Endpoint Protector. Offering enhanced protection, increased effectiveness …

National-scale iris and fingerprint identification

Neurotechnology announced MegaMatcher Accelerator 4.0, the latest update of the company’s multi-biometric software and hardware solution for high-volume, high-speed …

Android malware is stealing your data

The second half of 2011 has been an active one for cyber criminals, who have been increasingly looking for chances to set up new scams in the mobile device environment. …

Microsoft drops suit against Kelihos botnet domain provider

The recent takedown of the relatively small Kelihos botnet and the subsequent civil suit raised by Microsoft was the first ever in which some of the defendants were …

Hackers attacked U.S. government satellites

Two U.S. satellites have been tampered with by hackers – possibly Chinese ones – in 2007 and 2008, claims a soon-to-be released report by the the U.S.-China …

Websense introduces URL categories and social web controls

Websense introduced URL categories and social web controls that enable IT managers to better regulate specific employee actions, reduce exposure to dangerous data-stealing …

Fake DHL delivery notification carries info-stealer Trojan

Malware peddlers have once again started a spam run that consists of emails purportedly sent by DHL. They spoofed the sender information, making it look like the email was …

Cisco WebEx Player WRF file processing vulnerabilities

Multiple buffer overflow vulnerabilities exist in the Cisco WebEx Recording Format (WRF) player. In some cases, exploitation of the vulnerabilities could allow a remote …

Data breaches cause lasting reputation damage

Reports of data breaches affecting some of today’s largest companies continue to grab the headlines of prominent news outlets nationwide. The damage experienced by a …

Replacement for legacy two-factor authentication

Yubico announced the availability of YubiRADIUS, a free, virtual appliance server that delivers secure remote access, SSL-VPN and VPN connectivity. Built on open source …

Proactive security for private clouds and virtual environments

Cyber-Ark Software extended its auto-discovery capabilities for proactively detecting privileged accounts within virtualized environments. This scalable capability to support …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools