Researchers at Trend Micro have analyzed a new Trojan that uses the Windows registry to hide all its malicious code, the security company reported...
Hi, what are you looking for?
Researchers at Trend Micro have analyzed a new Trojan that uses the Windows registry to hide all its malicious code, the security company reported...
The security startup behind the Mitro password manager has been acquired by Twitter, the team at Mitro announced on Thursday. The financial terms of...
Researchers at FireEye have analyzed the operations of the advanced persistent threat (APT) group dubbed "Pitty Tiger," and determined that it might have been...
Researchers Develop “BadUSB” to Demonstrate Extreme Threats Posed by USB DevicesUsers have long been warned about the dangers of using USB drives, but new...
Microsoft announced on Thursday the general availability of the Enhanced Mitigation Experience Toolkit (EMET) 5.0.
BitTorrent has provided additional details on Bleep, an encrypted voice and messaging application which, unlike similar solutions, doesn't rely on central servers.
While conducting penetration testing for one of its customers, Offensive Security uncovered three zero-day vulnerabilities in Symantec Endpoint Protection (SEP) that can be exploited...
Israel-based threat detection firm Seculert has been monitoring the effects of the recent Gameover Zeus and Shylock botnet takedown operations, and found that the...
Innominate Security Technologies, a Germany-based company that specializes in communication security components and solutions for industrial networks, has fixed a vulnerability affecting its mGuard...
Internet infrastructure giant Akamai Technologies has joined Microsoft and venture capital firm Jerusalem Venture Partners (JVP) in the cybersecurity startup accelerator program launched recently...
A global survey conducted by data protection solutions provider SafeNet once again confirms that data breaches, especially ones that involve financial data, have a...