Please turn on your JavaScript for this page to function normally.
Week in review: SSL encryption cracked, new Mac Trojan and the new issue of (IN)SECURE Magazine

Here’s an overview of some of last week’s most interesting news and articles: Smartphone and tablet security tips ICSA Labs is offering a series of tips that …

Over 300 cyberspy attacks against Russian targets discovered

Trend Micro researchers have discovered that 1465 computers belonging to 47 distinct political and economical entities in 61 different (mostly former Soviet Union) countries …

Strong security is just common sense

For many years those who concerned themselves with an organization’s cyber security warned of threats, both internal and external, urging organizations to adequately …

How to build a trusted virtualized platform

Trusted Computing Group (TCG) released the first Virtualized Platform Architecture, which describes how to build a trusted virtualized platform. With this specification, …

ICSA Labs launches network IPS testing program

ICSA Labs is launching a quarterly testing program for network intrusion prevention systems. The quarterly testing, which is available to all IPS manufacturers, is also an …

Veracode enhances its application risk management platform

Veracode, announced enhancements to its cloud-based application risk management platform that make it even easier to embed security verification processes into the software …

OpenStack Diablo to power global clouds

OpenStack, the open source cloud operating system, released Diablo, the fourth version of its community-driven software. OpenStack Diablo allows users to automate and control …

Tips for safe online shopping

Avira recommends that consumers watch for a few things in order to not become a victim of the online fraudsters: 1. Always check that the connection to the online store where …

FortiNet FortiAnalyzer XSS and script insertion vulnerabilities

Two vulnerabilities have been reported in FortiNet FortiAnalyzer, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to …

Security guidelines for PKI-based transactions

For all the infrastructure advantages and business benefits of PKI, recent breaches clearly indicate that the way in which PKI is implemented may not be as inherently secure …

Cisco reveals the importance of networks in daily life

Demonstrating the increasing role of the network in people’s lives, an international workforce study by Cisco revealed that one in three college students and young …

(IN)SECURE Magazine issue 31 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 31 has been released today. Table of contents: The …

Don't miss

Cybersecurity news