Please turn on your JavaScript for this page to function normally.
Cloud Computing: Automating the Virtualized Data Center

Cloud computing will revolutionize the way IT resources are deployed, configured, and managed for years to come. Service providers and customers each stand to realize …

Week in review: Stratfor breach, brute-forcing WAPs and an analysis of Facebook attacks

Here’s an overview of some of last week’s most interesting news: What’s in store for us in 2012 Looking forward into what lies ahead for us in 2012, Zscaler …

Microsoft releases MS11-100 for ASP.NET DoS attack

Today Microsoft released a security bulletin addressing a flaw in ASP.NET that was disclosed early morning yesterday at the Chaos Communication Congress (CCC) in Berlin. …

Analysis of Facebook attacks

Commtouch published a comprehensive analysis of scores of malicious Facebook activities during the past year. Affiliate marketing sites are the final destination in …

SCADA and PLC vulnerabilities in correctional facilities

Many prisons and jails use SCADA systems with PLCs to open and close doors. Using original and publicly available exploits along with evaluating vulnerabilities in electronic …

A Bug Hunter’s Diary

For individuals who make a living developing and maintaining software systems, finding bugs in their own code is almost a daily ritual. Working on software developing projects …

Microsoft provides protection for ASP.NET vulnerability

Microsoft published Security Advisory 2659883 to provide a workaround to help protect ASP.NET customers from a publicly disclosed vulnerability that affects various Web …

Emerging threats to become major players in 2012

Emerging threats from 2011 are on track to become the major players for cyberactivity in 2012, including mobile banking, “legal” spam and virtual currency. McAfee …

Mac management tools from Google

Google’s internal Macintosh Operations team is starting to release the utilities, tools, and scripts for managing and tracking a fleet of Macintoshes in a corporate …

Data-stealing malware growth spikes

The propagation of some forms of crimeware surged in the half-year period ending in June, 2011 with data-stealing malware reaching and maintaining a new plateau of contagion, …

What’s in store for us in 2012

Looking forward into what lies ahead for us in 2012, Zscaler offers predictions for the upcoming threat landscape. 1. Mobile: With WebOS now officially an orphan, Blackberry …

NAC system PacketFence 3.1.0 released

PacketFence is a fully supported, trusted, free and open source network access control (NAC) system. Boasting a feature set including a captive-portal for registration and …

Don't miss

Cybersecurity news