Please turn on your JavaScript for this page to function normally.
Major vulnerabilities in office security and RFID systems

At the Black Hat conference in Las Vegas, researchers will reveal critical vulnerabilities in many of the world’s most widely-used building security systems and …

ISACA updates IS Audit and Assurance Standards

ISACA has issued revised Information Systems (IS) Audit and Assurance Standards. The standards have an effective date of 1 November 2013. Introduced in 1988, the IS Audit and …

File infector EXPIRO hits US, steals FTP credentials

An unusual attack has been spotted in the wild, using an unexpected combination of threats. This attack used exploit kits (in particular Java and PDF exploits) to deliver file …

Bank security breaches destroy customer trust

85 percent of U.S. adults with banking accounts are at least somewhat concerned about online banking fraud, according to Entersekt. Such fraud can include phishing, malware, …

Switch secures confidential data on separate networks

Belkin expanded its secure product line with the addition of the Belkin DisplayPort KVM Switch. The new switch offers the ideal solution for federal and defense users who …

Tripwire updates Log Center solution

Tripwire announced the availability of its Log Center TLC 7.0 featuring the first phase of integration with IP360, as well as Tripwire’s new VIA Agent, log intelligence, …

Metrics: Valuable security indicator or noise?

Many organizations believe that IT, and by association IT security, is a wasted expense. They recognize that the financial investment needs to be made but few truly understand …

DDoS attacks are getting bigger, stronger and longer

Prolexic Technologies announced that the average packet-per-second (pps) rate reached 47.4 Mpps and the average bandwidth reached 49.24 Gbps based on data collected in Q2 2013 …

Social engineering tops list of help desk security threats

Help desks are most commonly asked to assist users in addressing common IT problems including password resets and application and connectivity issues. Often the performance of …

Vendors patch security vulnerabilities within 3 weeks

High-Tech Bridge Security Research Lab released its statistics on web application security for the first half of 2013. The statistics is based on HTB Security Advisories that …

Many join EFF to sue NSA over illegal surveillance

Nineteen organizations including gun ownership advocates, and a broad coalition of membership and political advocacy organizations filed suit against the NSA for violating …

US retains spamming crown

Sophos has published the latest ‘Dirty Dozen’ of spam relaying countries, covering the second quarter of 2013. As the US retains the top spot among spam-relaying …

Don't miss

Cybersecurity news