Please turn on your JavaScript for this page to function normally.
IBM secures mobile and instrumented devices

IBM announced new initiatives to extend security to the growing number of mobile and instrumented devices beyond an organization’s own four walls, such as smartphones, …

Security service for Android and Symbian

The new version of F-Secure’s Protection Service for Mobile (PSM 7) enables operators to offer protection and parental control for their customers’ mobile devices. …

7 critical questions to ask before developing a social media policy

Social media disrupts the long-standing rules of business in many ways, but crafting a social media policy is premature unless the designers of the policy answer seven …

Immunet 3.0 introduces custom anti-malware signatures

Sourcefire released Immunet 3.0 which enables users to create custom anti-malware signatures for more accurate protection against targeted attacks and offers a Cloud Recall …

Network situational awareness and retro analysis

Trisul is a Linux based application that passively listens to network traffic and tracks a number of traffic metrics across all layers. It correlates these traffic metrics …

Ruby on Rails CSRF protection bypass vulnerability

There is a vulnerability in Ruby on Rails which could allow an attacker to circumvent the CSRF protection provided. The issue affects versions 2.1.0 and above and has been …

1 in 3 EU Internet users infected by malware

The EU has been at the forefront in leveraging IT advancements. The region has a high Internet penetration rate and over two-thirds of the population uses Internet. However, …

Say “I love you” with the Magic Blue Pill!

It is, after all, the season where we express to our loved ones just how much we care about, appreciate, and truly love them. Since the start of the month Websense Security …

Protected health information breach analysis

Redspin released an analysis of all protected health information breaches publicly recorded between August 2009 and the end of 2010, as per the interim final breach …

Injection attacks tutorial

This episode of the OWASP appsec tutorial series describes the #1 attack on the OWASP top 10 – injection attacks. The video illustrates SQL injection, discusses other …

Adobe Reader X critical vulnerabilities patched

Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and …

Web malware grew by 139 percent

Cisco’s latest global threat report reveals that Web malware increased by 139 percent in 2010 compared with the previous year. The rate of Web malware encounters peaked …

Don't miss

Cybersecurity news