Please turn on your JavaScript for this page to function normally.
Apple updates Java for Mac OS X 10.5 and 10.6

The latest Java updates from Apple deliver improved reliability, security, and compatibility. Java for Mac OS X 10.5 Update 9 delivers improved compatibility, security, and …

Risks to address when contracting for cloud services

Gartner has identified four risky issues that CIOs and sourcing executives should be aware of when contracting for cloud services. “Cloud service providers will need to …

AV industry fails to cover the basics

NSS Labs released two test reports of endpoint protection products which reveal new shortcomings in these widely deployed products. They cover multi-vector attacks (malware …

New variant of SpyEye banking malware

Norman researchers identified an emerging variant of the SpyEye Trojan that targets specific online banking applications. SpyEye is a malware toolkit that has become …

The privacy impact of electronic health records

While patients trust their doctors to protect their information, 49 percent believe that EHRs will have a negative impact on the privacy of their PHI and health data, …

Microsoft patches four vulnerabilities in Windows and Office

Today Microsoft released three security bulletins: one is rated Critical and two are rated Important. The bulletins address four unique vulnerabilities in Microsoft Windows …

Evaluate the effectiveness of your cyber armor

When evaluating our effectiveness in dealing with cyber defense, we have two layers of uncertainty and risk: how effectively are we protecting critical information, and what …

(IN)SECURE Magazine issue 29 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 29 has been released today. Table of contents …

Security concerns around “backdoor” mobile devices

Employee owned, “backdoor’ mobile devices entering the corporate network highlight ongoing security challenges with enterprise mobility, according to Mformation. …

Malvertising attacks surge

Malvertising is on a significant rise, having doubled from Q3 to Q4 2010, according to Dasient. Based on Q4 estimates, three million malvertising impressions were served per …

Tough questions about botnets

ENISA published a comprehensive study on the botnet threat and how to address it. The report looks at the reliability of botnet size estimates and makes recommendations for …

Metasploit Pro 3.6 released

Metasploit brings an enhanced command-line feature set for increased proficiency and detailed PCI reports with pass/fail information for a view of compliance posture with PCI …

Don't miss

Cybersecurity news