Macs harbor both Mac and Windows malware

Macs harbor both Mac and Windows malware


Macs harbor both Mac and Windows malware

Posted: 24 Apr 2012 11:22 AM PDT

Have the predictions made yearly by many security firms finally come true? Will Mac users be forced to invest in a good antivirus solution? According to the latest numbers produced by security firm So...

First portable malware intelligence system

Posted: 24 Apr 2012 10:02 AM PDT

ValidEdge has unveiled a real-time malware analysis engine built into a standard laptop, delivering the power to analyze up to 1000 malware samples per day in a fully functional laptop without comprom...

Google raises bug bounty to $20,000

Posted: 24 Apr 2012 08:20 AM PDT

Google has announced that it will be updating the rules for its bug bounty program and will start handing out bigger amounts to the researchers participating in it. According to a blog post by Adam...

Web application attack report from FireHost

Posted: 24 Apr 2012 06:48 AM PDT

Secure cloud hosting company, FireHost, has revealed details about type and origin of web attacks that it has blocked from causing harm to clients' web applications and databases hosted at its secure ...

Fake warning about Olympic-themed scams carries malware

Posted: 24 Apr 2012 05:39 AM PDT

It's three months to go until the start of the London Olympics 2012, and sports fans are searching for and buying tickets to the various events online. Unfortunately, it's inevitable that the inte...

Russian cybercrime market doubles in size

Posted: 24 Apr 2012 04:20 AM PDT

Russian cybercrime investigation and computer forensics company and LETA Group subsidiary Group-IB released a 28-page report prepared by analysts from its computer forensics lab and its CERT-GIB unit ...

BYOD is both an opportunity and a threat

Posted: 24 Apr 2012 04:03 AM PDT

A survey titled "What is your approach to BYOD – Love it? Hate it?" and conducted among 316 IT and security professionals set out to assess the opinions of IT and network security professionals about ...

Users worry about data security, but still trust social networks

Posted: 24 Apr 2012 03:14 AM PDT

Although the majority of people (71 percent) are worried about the amount of personal information held online, a significant proportion would still share confidential information with people they didn...

Enterprise encryption with near zero overhead

Posted: 24 Apr 2012 03:02 AM PDT

Vormetric announced Vormetric Encryption V5, which significantly reduces the cost and application impact of encryption by using software enhancements and hardware encryption technologies such as Intel...

Enhanced security awareness for tablet users

Posted: 24 Apr 2012 02:18 AM PDT

Cryptzone unveiled the latest release of NETconsent Compliance Suite, its policy management software. Recognising how difficult it is to raise IT security awareness amongst an increasingly mobile w...

Phishing and malware meet cheque fraud

Posted: 24 Apr 2012 12:01 AM PDT

Trusteer recently uncovered a scam in an underground forum that shows how data obtained through phishing and malware attacks can be used to make one of the oldest forms of fraud – cheque forging – eve...

SIEM and vulnerability management integration

Posted: 23 Apr 2012 11:40 PM PDT

LogRhythm and Qualys announced their partnership and the integration of LogRhythm's SIEM 2.0 platform with Qualys' QualysGuard Vulnerability Management (VM). The integration of QualysGuard's accura...

0 comments:

Post a Comment