Please turn on your JavaScript for this page to function normally.
IRISS Conference 2011 call for papers

IRISS will hold its second annual conference on Wednesday the 23rd of November 2011 in Dublin. This is an all day conference which focuses on providing attendees with an …

AppSec adds blocking, virtual patching to database activity monitoring solution

Application Security announced new enhancements to DbProtect. Version 6.3 of this database security solution now includes the ability to block real-time attack and …

Week in review: LulzSec attacks, RSA admits compromise of SecurID tokens and new issue of (IN)SECURE Magazine

Here’s an overview of some of last week’s most interesting news and articles: FBI affiliate organization hacked, user database leaked Only a day after they leaked …

Malware writers rely on users not updating

When infecting PCs, online criminals are increasingly benefiting from uninstalled updates for browsers and their components. Research carried out by G Data SecurityLabs …

Continued attacks on social networks

GFI Software announced the top 10 most prevalent malware threats for the month of May 2011. The month was marked by a number of Facebook survey scams baiting users with offers …

Study examining the usage of hardware-based encrypting drives

The Trusted Computing Group (TCG) and Ponemon Institute released a full report on the perceptions about self-encrypting drives. The study interviewed 517 IT practitioners in …

Most organization experienced data loss

75% of UK organizations experienced data loss in the last year, compared with an average of 77% internationally, according to Check Point. Key findings from the survey show …

Cybercriminals targeting sporting events and music festivals

BitDefender identified a series of scams targeting music festival goers, sporting event fans and holidaymakers this summer. The top summer-themed spam messages for 2011 relate …

Forensic data capture and data extraction

Logicub announced the Talon Enhanced forensic data capture solution and the CellXtract data extraction solution for mobile devices. The Talon Enhanced provides fast data …

Drupal Prepopulate Module vulnerabilities

Two vulnerabilities have been reported in the Prepopulate module for Drupal, which can be exploited by malicious users to conduct script insertion attacks and by malicious …

How search engine poisoning works

Imperva disclosed the intricate workings of a Search Engine Poisoning (SEP) campaign. The attack was extremely successful and continued to run for at least 15 months without …

Tips for embracing cloud computing

In today’s complex landscape of constant innovation and change, organizations should take advantage of emerging capabilities, skills and processes to address their …

Don't miss

Cybersecurity news