A cyber espionage network has been allowed to flourish in Eastern Europe, former Soviet republics and Central Asian countries since …

A cyber espionage network has been allowed to flourish in Eastern Europe, former Soviet republics and Central Asian countries since …
Microsoft will deviate from its regular Internet Explorer repair schedule today by releasing a patch for older versions of its …
Following Google’s recent upgrade of Chrome, a new wave of bogus updates has been set upon the Internet by cyber …
Though U.S. officials have consistently blamed Iran for the ongoing stream of distributed denial of service attacks (DDoS) against major …
Among your typical New Year’s resolutions–lose weight, stop smoking, be happier–you should consider making some pledges to better secure your …
Java 6 will be retired from security support in less than two months, and users and businesses should prepare now …
Adobe plans in February to close a dangerous hole in its Shockwave application that causes the application to be downgraded …
Europe’s top data privacy agency has launched a formal investigation into Microsoft’s privacy policy. Microsoft confirmed on Tuesday that it …
Cyber espionage is nothing new. So a report from the Defense Security Service (DSS) about efforts in foreign countries to …
Iran’s national CERT has warned of a new type of data-wiping malware that bears some of the hallmarks of a cyberattack that severely …
In a new twist, spammers have built a botnet that sends SMS spam through infected Android phones, shifting the potentially …
Change in any industry involves conflict. Evolution and revolution in tech this year took place not only in the marketplace …
Security researchers have presented proof-of-concept code capable of accessing the database driving a Microsoft ERP system and then diverting …
Apple has quietly hired Kristin Paget, a former Microsoft security expert who worked as a hacker for the company to …
ESET Middle East has sent out a warning to consumers advising them to be extra cautious and alert when shopping online this …
In 2012 mobility, virtualisation and cloud computing were three big trends that affected change in the way organisations across the …
After gathering analysis of targeted attack data collected between February and September this year, Trend Micro found that 91 percent …
IT managers in corporate and mid-size businesses have to balance both network performance and network security concerns. While security requirements …
After a number of delays, the beta of the Fedora 18 Linux-based distribution has been released. The beta release date …
Despite vowing that fighting cybercrime is high on its agenda, the European Commission increased its planned cyber security budget by …