- Security Blog
- By Eduard Kovacs
- October 12th, 2012
AVG CloudCare Allows IT Resellers to Meet Security Demands of Small Businesses
It's not easy to offer a small company the services it requires
- Security
- By Eduard Kovacs
- October 12th, 2012
Criminals Don’t Hide Their Online Tracks As Well As Cybercriminals, Experts Say
Kaspersky researcher uses cleverly designed script to track down a kidnapper
- Security
- By Eduard Kovacs
- October 12th, 2012
US Government Officials Say Iran Is Responsible for Attacks on Saudi Aramco
United States agencies participated in the cyberattack investigation
- Security
- By Eduard Kovacs
- October 12th, 2012
Experts: Banks Should Review Authentication Procedures to Prevent Trojan Attacks
Solutionary researchers also offer advice on how regular users can pitch in
- Security Blog
- By Eduard Kovacs
- October 11th, 2012
Information Security Forum Releases Benchmark as a Service Tool
The product can be used for an unlimited number of times for $20,000 (16,000 EUR) per year
- Security Blog
- By Eduard Kovacs
- October 10th, 2012
Rapid 7 Expands Security Risk Management Portfolio by Acquiring Mobilisafe
The company wants to help its customers in addressing the issues posed by BYOD
- Security
- By Eduard Kovacs
- October 10th, 2012
SpectorSoft Acquires Corner Bowl Software, Releases “Server Manager”
A 20-day trial has been made available for the new software product
- Advisories
- By Eduard Kovacs
- October 10th, 2012
Solutionary Experts Highlight the Importance of Practice in Cyber Security
"Practice makes perfect" doesn't apply only in sports
- Security Blog
- By Eduard Kovacs
- October 9th, 2012
Expert Reveals the Things That Allow Hackers to “Pwn” Websites [Video]
Troy Hunt's complete presentation at the Developer Developer Developer! conference
- Security Blog
- By Eduard Kovacs
- October 9th, 2012
Israel and China Blamed for Attacks on Iranian Oil Company
The organization implemented a clever system to fend off such threats
- Security Fixes and Improvements
- By Eduard Kovacs
- October 9th, 2012
Trend Micro Launches “Custom Defense,” APT Protection and Analysis Solution
The product focuses on detection, analysis, adaption and response
- Incidents
- By Eduard Kovacs
- October 9th, 2012
Huawei on Anti-China Report: US Was Committed to a Predetermined Outcome
US officials recommend businesses not to turn to the services of Chinese firms
- Security Blog
- By Eduard Kovacs
- October 8th, 2012
Think Tanks Constantly Targeted by Chinese and Other Hackers
Experts and officials reveal that such organizations hold highly valuable information
- Security Blog
- By Eduard Kovacs
- October 8th, 2012
Officials Determined to Shun Huawei and ZTE from the US
The companies are considered a security threat to the United States
- Security Blog
- By Eduard Kovacs
- October 6th, 2012
Cyber Europe 2012: Over 300 Professionals Simulate Massive Cyber Attack
Representatives of 25 countries participated in the exercise
- Security
- By Eduard Kovacs
- October 5th, 2012
Cybercriminal Ring Seeks 100 Botmasters to Launch Trojan Attack on 30 US Banks
It could be the largest coordinated attack American financial institutions have ever seen
- Virus alerts
- By Eduard Kovacs
- October 5th, 2012
Cybercriminals Turn To Universal Man in the Browser Attacks to Steal Valuable Data [Video]
Fraudsters can target the information entered by a victim on all websites