• Windows XP will leave organizations severely exposed

    The clock is ticking – as of this week Microsoft will no longer support Windows XP. The operating system will pose an increasing risk to its users, making it more important than ever for organizations to identify and upgrade legacy systems wherever possible, or have stringent network security in place to mitigate the risks and to create a virtual “ring of steel” around the most susceptible systems. Windows XP has been a fairly stable, reliable and extremely popular operating system for over a decade now, but it really is time to put the venerable OS out to pasture.

  • Microsoft to release only four bulletins on Tuesday

    The Microsoft April security release is almost upon us with security updates scheduled to deploy on Tuesday, April 8th. This day will go down in history as a major milestone for Windows XP and Office 2003 since it will be the last day these products will be supported.

  • This phishing page can do more than steal your credentials

    Our research has led us to a fresh Google login clone. The phishing page in question contains code that allows it to identify the browser type used to access it. It pops up an overlay message notifying the user that he needs to download a supposed set-up file in order to update their browser (and perhaps eventually the “outdated plug-ins”).

  • Windows XP usage lower across industries

    The end-of-life for XP which has been announced for a number of years now, means that computers running XP will be very attackable in the near future. Over 70% Microsoft’s security bulletins in 2013 affected XP, and there is no reason to assume that this will change in the near future.

  • Mobile data leakage

    In this podcast recorded at RSA Conference 2014, Mike Raggo, Security Evangelist at MobileIron, discusses mobile data leakage, and provides tips on how to secure email, public and in-house apps, illustrates data exposure, and much more.

Videos      Podcasts


Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.


Fri, Apr 18th