Please turn on your JavaScript for this page to function normally.
Lifecycle model for managing unknown vulnerabilities

Codenomicon released its Unknown Vulnerability Management (UVM) Lifecycle model, a security assurance process, which focuses on unreported vulnerabilities. The UVM model helps …

Siemens FactoryLink multiple vulnerabilities

Multiple vulnerabilities in Siemens FactoryLink can be exploited by malicious people to disclose potentially sensitive information, cause a Denial of Service, and compromise a …

Qualys partners with StopBadware

Qualys is partnering with the non-profit anti-malware organization StopBadware. The two organizations will leverage one another’s strengths to bolster the Web’s …

Global spam drops by a third as Rustock botnet is dismantled

Symantec analysis reveals that in March, prior to its takedown, the Rustock botnet had been sending as many as 13.82 billion spam emails daily, accounting for an average of …

Cisco to acquire newScale

Cisco today announced its intent to acquire privately-held newScale, a provider of software that delivers a service catalog and self-service portal for IT organizations to …

The most challenging compliance regulation? HIPAA

From an IT standpoint, the Health Insurance Portability and Accountability Act (HIPAA) is the most challenging regulation to businesses today, according to Ipswitch. HIPAA, …

The smartphone: A real bug in your bed

The rise of the smartphone over the past few years has been a technology success story. An almost perfect storm of advancing materials science, chip set development, software …

VPN client suite for Mac OS X

NCP engineering released its centrally managed IPsec VPN client for Mac OS X 10.5 (Intel) and 10.6. Mobile employees using Mac OS X are now able to access the company network …

Spotify has been displaying malicious ads

Streaming music service Spotify has been displaying malicious ads to users of their Free version. The ads lead to websites that used the Blackhole Exploit Kit to infect users …

Intellectual capital is the new cybercrime currency

Cybercriminals understand there is greater value in selling a corporations’ proprietary information and trade secrets which have little to no protection making …

Protect the privacy of your Android phone

Privacy Blocker is an Android application that stops other installed applications from gathering your personal information. The software basically pinpoints the type of data …

Most organizations can’t access critical security data

Many enterprises feel that their security processes are failing to meet their potential due to a lack of coordination, benchmarking, and proactive improvement among the …

Don't miss

Cybersecurity news