New Mac-based security threats jumped in 2011, but still remain far below that of Windows PCs, according to a report by F-Secure Labs. A total of 58 unique variants were detected from April through December, according to the Labs’ Threat Research team. Nearly half, 29, were Trojan downloaders, which F-Secure…
RSA to focus on mobile threats and Pegasus cloud security
RSA Security executives have outlined the company’s 2012 product strategy, focusing on mobility, anti-threat and cloud security. Earlier this week RSA executive chairman Art Coviello revealed that following the attack that compromised RSA SecurID tokens last year, the company has been sought after by others who do not want such…
F-Secure: ‘Several dozen’ malware threats to Mac in 2011
More than before, but not consummate with growth The Mac platform saw a modest increase in malware outbreaks in 2011 over years past, but still “a small fraction” when compared to Windows, said security firm F-Secure. It added that while malware attacks were increasing, the rate of increase was not…
Understanding and Detecting Mobile Malware Threats
Every couple of years there’s a new “hot threat” in security for which vendors abruptly tout newfangled protection and potential customers clamor for additional defense options. Once upon a time it was spyware, a few years ago it was data leakage, and today it’s mobile malware. It’s a reoccurring cycle,…
Protecting the Nation’s Electric Grid from Cyber Threats
Protecting the electric system from cyber threats and ensuring its resilience are vital to our national security and economic well-being. This is exactly why cybersecurity is one of four key themes in the White House’s Policy Framework for a 21st Century Grid . For obvious reasons, the private sector shares…
Cyber Threats Gaining Attention
If vendors and risk consultants are right, 2012 could be a dreadful year for cyber attacks. View full post on cyber terrorism – Yahoo! News Search Results View full post on National Cyber Security
5 top cyber threats for 2012
As cybercriminals improve their toolkits and malware, they’re moving away from hacking personal computers to mobile devices, as well as plotting other more sophisticated attacks, according to a report on the top cyber threats for 2012. View full post on cyber extortion – Yahoo! News Search Results View full post…
2012 Will be Filled with Cyber Threats
Other links you may like: The cyberthreats organizations and individuals are likely to face in 2012 will resemble those they faces in 2011, only more so; among the increased threats: attacks on critical infrastructure, mobile devices and consumer electronics, and politically motivated attacks. McAfee has released its list of the…
Cyber-crime security integration for Joomla and Drupal hosting kills hacker threats
CNP Integrations brings on the New Year announcing an unmatched hosting platform. CNP Integrations has launched a new strategic hosting platform featuring; SecureLive Security Monitoring, RackSpace cloud hosting combined with the world class web application support services from the CNP Integrations team.Boston, MA (PRWEB) January 02, 2012 CNP Integrations (a…
Is your mobile phone secure from 2012’s biggest mobile threats?
For more than a decade they toiled in the strange, boxy-looking building on the hill above the municipal airport, the building with no windows (except in the cafeteria), the building filled with secrets. Article source: http://news.yahoo.com/mobile-phone-secure-2012-biggest-mobile-threats-151148219.html View full post on National Cyber Security » Virus/Malware/Worms