Akamai Technologies has released its State of the Internet report for the first quarter of 2012, based on data collected from its massive global...
Hi, what are you looking for?
Akamai Technologies has released its State of the Internet report for the first quarter of 2012, based on data collected from its massive global...
Researchers have uncovered another attack exploiting a Java vulnerability against activists and government agencies in Nepal. The attack resulted in a backdoor being installed...
There are signs that the FinFisher "lawful interception" spyware may be installed on command-and-control computers in at least ten different countries, including the United States, according...
Trend Micro Adds Big Data Capabilities to its “Smart Protection Network” for Enhanced Cloud, Mobile and Targeted Attack ProtectionTrend Micro has expanded its cloud-based security...
Security researchers have identified new Zeus malware samples targeting Android and BlackBerry devices.
As organizations shift towards the cloud to store and transfer sensitive and confidential information, there are some disagreements over who was in charge of...
Attack Surface Analyzer Helps Developers During the Verification Phase of the Microsoft Security Development Lifecycle (SDL) Microsoft has released the public version of Attack...
Senators Propose Non-Cyber Related Amendments To Cybersecurity Act of 2012, Including Banning High-capacity Ammunition Clips and AbortionNews Update: Cybersecurity Bill Fails in US Senate
Verizon “Redefines” VERIS, Improves Open Information Sharing Verizon Business has publicly released the data anonymously submitted by organizations to its incident-sharing program and promised...
Experienced, mid-level employees may be the ones to watch when it comes to insider fraud in financial organizations, according to a recent report from...
What Does 8861 Mean? Security Researchers Search for Significance Researchers are asking for help figuring out the significance of a password frequently used in...