Bing, Yahoo! serving malware for popular search terms
Bing results for popular search terms such as “Firefox/Skype/AdobePlayer/uTorrent download” have been poisoned with bogus websites pushing a variety of malware. On …
Evolving cyber threats continue to drive security strategy
43 percent of global companies think they have an effective information security strategy in place and are proactively executing their plans, placing them in the category of …
NFC-enabled BlackBerry smartphones will “open doors”
HID Global plans to support the company’s iCLASS digital keys and mobile secure identity on NFC-enabled BlackBerry smartphones. The new BlackBerry Bold 9900/9930 and …
Data mapping and masking requirements
A new study of 3,765 publicly disclosed breach incidents shows they resulted in financial losses of more than $156 billion. Published by the Digital Forensics Association, the …
Data loss management SaaS
Co3 Systems announced an automated, repeatable way to prepare for data loss events, assess their potential impact, and generate and manage incident response plans more …
When scammers socialize
A sophisticated, seemingly broadly orchestrated online scam that promises bogus prizes like iPads or gift cards in order to dupe Internet users into giving up their …
Security case for iPhone 4
BungeeAir is based on a wireless technology that instantly creates a connection between your iPhone and a compact key fob to create a security tether keeping your phone and …
LockDown: USB 3.0 password protected HDD enclosure
Satechi introduced LockDown, a portable external SATA hard drive enclosure that not only keeps your data securely with a encrypted 256-bit AES hardware password protection but …
Windows 8 new security features
The Internet is all abuzz with the news of the upcoming Windows 8, whose early version has been demonstrated on Tuesday at Microsoft’s BUILD conference. Setting aside …
65% of security pros say SIEM is dead
Two-thirds (65 percent) of senior security professionals at Global 5000 and federal organizations say traditional Security Information and Event Management (SIEM) products no …
phpMyAdmin multiple script insertion vulnerabilities
Multiple vulnerabilities have been reported in phpMyAdmin, which can be exploited by malicious users to conduct script insertion attacks, according to Secunia. 1. Certain …
Trend Micro enhances mobile security for Android
Trend Micro announced Trend Micro Mobile Security Personal Edition, a solution designed to protect Android smartphones and tablets. In January 2011, Trend Micro introduced …
Featured news
Resources
Don't miss
- What Cloudflare’s 2025 internet review says about attacks, outages, and traffic shifts
- Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
- Kali Linux 2025.4: New tools and “quality-of-life” improvements
- How researchers are teaching AI agents to ask for permission the right way
- Prometheus: Open-source metrics and monitoring systems and services