Attackers take advantage of emerging technologies
Attackers continue to focus on social engineering attacks and circumventing legacy enterprise security systems, according to Zscaler. Q4 saw shifts in the sources of …
Intel completes McAfee acquisition
Intel announced the acquisition of McAfee is complete. McAfee will continue developing and selling security products and services under its own brand. Intel and McAfee plan to …
Eating the US EMV elephant
Last week, Visa announced that it would eliminate the requirement for eligible merchants to annually validate their compliance with the PCI DSS for any year in which at least …
Toshiba e-Studio855SE series with advanced security features
Toshiba introduced their new e-STUDIO855SE Series (models 555SE, 655SE, 755SE, 855SE) which provides Hard Disk Drive (HDD) Encryption and Data Overwrite out of the box. …
Moldovan fraud ring mastermind arrested
A coordinated effort of the Irish gardai and custom officers has led to the arrest of a Moldovan man that is thought to be the leader of and mastermind behind an international …
Cisco Firewall Services Module DoS vulnerability
A vulnerability exists in the Cisco Firewall Services Module (FWSM) for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers that may cause the Cisco FWSM to …
Banking MitB Trojan effective with most browsers
Man-in-the-Browser attacks are becoming ever more popular with cybercriminals that seek to plunder bank accounts. The latest in a long string of banking Trojans that aids them …
Play.com customers at risk from phishing
Play.com, one of the biggest UK online retailers, has its share of scammers that try to lure users searching for a bargain and scam them out of their hard earned money. Play …
150,000 Gmail accounts reset and contents deleted
Word about the accidental resetting of Gmail accounts has been spreading on the Internet in the last two days as users Tweeted that their e-mail accounts have been stripped …
New backdoor Mac OS X Trojan surfaces
There are many good reasons to choose a Mac machine, and among those is surely the fact that malware for OS X still pops up rarely. As Apple slowly but surely increases its …
Control physical and virtual machines on a network
Shavlik Technologies announced solutions that provide an approach to controlling all physical and virtual machines on a network. The company introduced NetChk Protect 7.8 and …
Video: Light painting Wi-Fi
This project explores the invisible terrain of Wi-Fi networks in urban spaces by light painting signal strength in long-exposure photographs. A four meter long measuring rod …
Featured news
Resources
Don't miss
- Black Friday 2025 cybersecurity deals to explore
- Quantum encryption is pushing satellite hardware to its limits
- cnspec: Open-source, cloud-native security and policy project
- The privacy tension driving the medical data shift nobody wants to talk about
- Salesforce Gainsight compromise: Early findings and customer guidance