BlackBerry prides itself on its reputation as providing a secure mobile option – but it too occasionally finds flaws. The company’s Security Incident Response Team (BBSIRT) has released four security advisories having to do with Adobe Flash Player, Web…
Massive Botnet is Behind Tor Usage Spike
Despite speculation that Operation PRISM and concerns over NSA surveillance are spurring users to take up online privacy safeguards in droves, the sudden spike in usage for the Tor browser that began in August can be attributable to pretty much one thi…
Crackdown on Cybercriminals Equals Reduced Cybercrime in Russia
The latest analysis from a major Russian security firm indicates that the Russian cybercrime market has contracted by 6% – down from $2,055 million in 2011 to $1,936 million in 2012.
NSA to Recommend TPM Standard for Government Use
The US National Security Agency (NSA) will advise that all IT products purchased by government agencies to protect information on national security systems make use of hardware-based trusted platform module (TPM) chips or security devices.
Vast Majority of PCs have Java Vulnerabilities
A vast majority – 81% – of Windows machines are running an outdated version of Java, leaving their users wide open to known exploits.
War of the Trojans: ‘Alien’ Invasion Spreads Third-Party Malware
A nasty Android trojan, dubbed Obad.a, is being spread using botnets controlled by other criminal groups and created using a different malware – an “alien” distribution scheme that has peaked researcher interest.
Missouri S&T Combats Campus Cyberwoes with Software Donation
When it comes to cybersecurity, universities are faced with double goals: they struggle to protect their valuable intellectual property, as well as the personally identifying information of their students, faculty and staff. A recent cybersecurity depl…
Vint Cerf: Cyber-Fire Departments Should Be the First Line of Defense
The internet pioneer and chief evangelist for Google has been calling on the industry to get the next billion people connected worldwide, with ideas that range from low-orbiting satellites to cover rural areas to connectivity delivered by giant balloon…
Did the NSA Subvert the Security of IPv6?
Following the Snowden leaks revealing Bullrun – the NSA program to crack the world’s encryption – there is an emerging consensus that users can no longer automatically trust any security.
Clearswift Acquires Jedda Systems
Clearswift, an information governance (or data loss prevention) specialist, has announced the acquisition of the intellectual property rights of Australian firm Jedda Systems – and CEO Heath Davies says ‘watch this space’ for more acquisitions.