Google says Avast introduced a serious security hole when it created its Avastium secure web browser from a Chromium fork.
Symantec has discovered a spam campaign targeting Portuguese-language computers specifically focusing on companies based in Brazil with the goal of stealing email accounts to access sensitive corporate information.
A mysterious Good Samaritan has replaced the code on certain parts of the villanous Dridex botnet with Avira Anti-virus installers.
Malware keeps re-infecting sites and installing multiple backdoors in WordPress websites, according to a researcher from Sucuri Security.
Industry predictions for cyber-security are unlikely to achieve a consensus, but they do provide plenty of insights and recurring themes that serve as indicators of future trends, as the following edited forecasts reported by Tony Morbin demonstrate
There's no denying that cloud adoption is growing at a tremendous pace, along with a subsequent expansion of the threat landscape. Keeping mountains of data from numerous organisations on a third-party's servers might be a scary prospect for the security minded. But, Max Metzger asks, should we be worried?
Most companies are not ready or able to comply with the proposed new Data Protection Regulations, reports Roi Perez, while ignoring them is not an option given the prospect of heavy fines of up to €20 million
In instalment one of his four-part viewpoint series, Tony Collings outlines the first of his essential building blocks for the successful implementation of an IT project: have you got the business requirement right?
The threats faced and intelligence needed in enterprise security is always changing and the organisations that stay on top of these trends will be best placed to handle whatever comes their way says Mark Hughes.
The humble password is often seen as obsolete and ineffective. David Howell suggests that Secure Shell (SSH) key technology has several key advantages and can help to deliver the post-password world.