Manage all mobile devices from one destination
Lookout Mobile Security offers security protection and find-my-phone functionality to all tablet devices, including all Honeycomb and Ice Cream Sandwich Android devices, in …
Citrix delivers apps to any user on any device
Citrix announced the next stage of its strategy for Citrix CloudGateway, the unified service broker that aggregates, controls and delivers Windows, web, SaaS and mobile apps …
Naked Emma Watson video leads to malware
Fake videos or pictures of naked international celebrities are often used as lures in schemes to propagate malware. The latest of these videos purportedly features popular …
180,000 Swedes at risk following password-hacking spree
Registered members of around 60 popular Swedish websites are in danger of having their stolen login credentials misused by cyber crooks in the wake of the biggest ever …
Spam gang uses own URL shorteners
URL shortening services are deservedly popular with Internet users, but unfortunately they are loved by cyber crooks and spammers as well. While regular users appreciate …
Tsunami, a new backdoor for Mac OS X
Malware authors have taken an old piece of malware developed for Linux and have modified it to attack the Mac OS X platform, warns ESET. The OS X malware has been named …
Web application security vulnerabilities and strategies
The use of web applications has soared recently, due to the significant value they can add to enterprises by providing innovative ways to interact with customers. However, so …
First public cloud to support Solaris
CloudSigma announced the addition of Solaris to its cloud platform, making it the first major public cloud to support Solaris. Solaris supports more than 11,000 third-party …
1000 professionals are now CSSLP certified
(ISC)2 announced that over 1,000 professionals from 44 countries now hold its Certified Secure Software Lifecycle Professionals (CSSLP) certification. Application …
Cloud computing disaster recovery
Online Tech announced a disaster recovery solution for cloud computing. DR Now! replicates the entire hosted cloud including servers, software, network and security to an …
“So i googled your name” Twitter phishing scam
Some Twitter phishers prefer to scare or worry their targets into clicking on the offered link, others put their money on pure, unadulterated curiosity. The latest phishing …
Japanese Parliament’s computers infected, data stolen
As the investigation into the breach of Mitsubishi Heavy Industries’ networks discovered last month continues, internal sources have confirmed that sensitive and …
Featured news
Resources
Don't miss
- Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
 - How nations build and defend their cyberspace capabilities
 - Uncovering the risks of unmanaged identities
 - Deepfakes, fraud, and the fight for trust online
 - Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI