Counterfeit Cisco switches raise network security alarms
In a disconcerting event for IT professionals, counterfeit versions of Cisco Catalyst 2960-X Series switches were discovered on an unnamed business network.
In a disconcerting event for IT professionals, counterfeit versions of Cisco Catalyst 2960-X Series switches were discovered on an unnamed business network.
Hemisphere Technologies has signed an exclusive distributor agreement for Australia and New Zealand with Finnish cyber security provider, F-Secure.
“Customers are purchasing from many vendors to fill as many gaps as possible in their security deployments.”
"The rise of internet-connected devices that comprise the Internet of Things (IoT) is quietly affecting everyday life."
“Research paints a picture of Apple users as being more active on their mobile devices, but they may be unaware of the online risks they are taking."
“Wearables are letting people use their wireless devices for new things, so products like the Apple Watch are very exciting."
Some of the world's leading cryptographers are concerned about the increasing number of malicious programs that hold computers and mobile phones to ransom, in many cases by abusing the encryption algorithms they designed.
The group of attackers behind cyberintrusions at the White House and the Department of State last year used malware that bears strong similarities to cyberespionage tools suspected to be of Russian origin.
Security vendor Malwarebytes has flagged the Dell System Detect tool as a potentially unwanted application after older versions of the program were found to put computers at risk.
Ransomware authors continue improving file-encrypting programs and infection methods for Windows and Android, making these nightmarish attacks harder to avoid.
Facebook has partnered with antivirus firm ESET to offer users the ability to scan their computers for malware directly from inside the social networking site.
After Symantec blew the lid on Regin on Sunday, computer security experts and companies are revealing information that has lead to suspicions that the U.S. and U.K. are involved.
A malware program distributed recently through a rogue server on the Tor anonymity network was also used in targeted attacks against European government agencies.
If you haven't updated your Flash Player with the fixes released on Oct. 14, you may be vulnerable to new attacks using a commercial exploit kit called Fiesta, security researchers warn.
A leaked programming manual for interacting with the physical components of automated teller machines might have helped attackers create malware programs that were used to steal cash from ATMs in various parts of the world this year.