In a much-publicized recent case, scientists at Georgia Tech managed to get a specially crafted app that could perform all sorts of malicious activities app-aptly named Jekyll-onto the App Store

In a much-publicized recent case, scientists at Georgia Tech managed to get a specially crafted app that could perform all sorts of malicious activities app-aptly named Jekyll-onto the App Store
Smartphones are a treasure trove of personal information and it doesn’t take much for people who would mean you harm to get at all that sensitive data.
VMware’s NSX network virtualization platform, expected out by year end, will have a key security tool for deploying security software and services to VMware-based virtual machines.
About half of global organizations have suffered a cyberattack in the last year, said a report released on Tuesday by the Information Security Media Group and Bit9.
Twitter, The New York Times and other prominent websites were struck by a powerful cyberattack that continued affecting other websites into Tuesday evening, directing visitors to a site purportedly controlled by the Syrian Electronic Army (SEA).
AccessData this week announced that it has signed a distribution agreement with ARM, which specialises in cyber-security and other consumer-related IT software products in region.
In the never-ending battle of iOS versus Android, one of the biggest marks against Google is that its Play store isn’t regulated enough for the novice smartphone user.
As Windows 8 struggles to take off, Microsoft has decided to hire a new ad agency to handle the digital promotion of both the operating system and Microsoft Surface tablets.
Rapid 7 this week unveiled a new set of tools designed to help businesses better judge the overall effectiveness of existing security controls and the risk associated with users across the organization.
Lax password implementation has meant that operational technology (OT) is now vulnerable to security attacks.
Everything you have heard about cyber security is wrong, according to Gartner VP and distinguished analyst, John Girard.
Acting like a software version of a Transformer robot, a malware test app sneaked through Apple’s review process disguised as a harmless app, and then re-assembled itself into an aggressive attacker even while running inside the iOS “sandbox” designed to isolate apps and data from each other.
IBM has signed an agreement to acquire security company Trusteer, and plans to set up a cybersecurity software lab in …
Investing in anti-virus software is no longer enough to counter cyber attacks on vital data systems, especially if national security is at stake.
Android vulnerabilities make for some of the biggest security concerns of the moment, according to Trend Micro’s Q2 2013 Security Roundup Report.
Kaspersky Internet Security 2013 has been named the industry’s best home security solution by Dennis Technology Labs.
The TOR Project is advising that people stop using Windows after the discovery of a startling vulnerability in Firefox that undermined the main advantages of the privacy-centered network.
Fears about rogue apps and mobile malware may snag all the headlines, but when it comes down to brass tacks, …
A steady stream of questionable applications is flowing daily into Google’s Play store for Android devices, according to security vendor Symantec.
Malware removed from forty percent of computers in those botnets, according to the vendor.