Help Net Security
Insider threats plague data managers
Financial services organizations struggle with human error, abuse of privileges more than most. Application Security, Unisphere Research, and the International Sybase Users …
Microsoft Web Application Configuration Analyzer 2.0 released
Web Application Configuration Analyzer (WACA) is a tool that scans a server against a set of best practices recommended for pre-production and production servers. The list of …
A guideline for critical information infrastructure governance
ENISA launched a new publication on National Risk Management (NRM) preparedness. The report sets out the essential elements as a guideline for the governance of NRM in …
SpyEye Trojan attacks Verizon’s online payment page
Trusteer discovered a configuration of the SpyEye Trojan targeting Verizon’s online payment page and attempting to steal payment card information. The attack took place …
Worrying trend in credit card data security
A new BitDefender study which has revealed some concerning statistics on the personal protection of credit card data. 97% of 2,210 respondents aged 18 to 65 said they …
New vulnerability reporting framework
The Industry Consortium for Advancement of Security on the Internet (ICASI) published of its Common Vulnerability Reporting Framework (CVRF) Version 1.0. CVRF is an XML-based …
Microsoft Forefront Endpoint Protection 2012 Beta released
Microsoft released Forefront Endpoint Protection 2012 Beta which continues to provide proactive protection against known and unknown threats using multiple technologies in the …
Mobile Encryption for iOS and Android
Sophos announced a number of new enterprise product lines that together offer protection anywhere and on any device. Sophos Mobile Control provides lightweight device …
VirtualBox 4.0.8 released
VirtualBox enables desktop or laptop computers to run multiple operating systems simultaneously, and supports a variety of host operating systems, including Windows, Mac OS X, …
IBM Informix Storage Manager security bypass
A vulnerability has been reported in IBM Informix Storage Manager, which can be exploited by malicious people to bypass certain security restrictions, according to Secunia. …
Microsoft investigates the current threat landscape
Microsoft published volume 10 of the its Security Intelligence Report (SIRv10) which provides perspectives on software vulnerabilities, software vulnerability exploits, …
VMware acquires Shavlik Technologies
VMware has entered into a definitive agreement to acquire Shavlik Technologies, which provides a portfolio of on-premise and SaaS-based management solutions that enable SMBs …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations