Please turn on your JavaScript for this page to function normally.
Top 5 undiscovered vulnerabilities found on enterprise networks

A report by Lumeta highlights the five most prevalent undiscovered or unknown vulnerabilities commonly found on enterprise networks. 1. Incorrect or incomplete deployments of …

Win a copy of “Nmap Network Scanning” or “Hacking Exposed: Windows Forensics”

If you win, we will e-mail you on August 13. Our weekly newsletter is packed with information security news. You will receive it every Monday morning.

IP-based control over enterprise networks

Cloud Systems announced the release of atmospherics 2.3 which executes control of any networked infrastructure from any device with a web browser. Atmospherics 2.3 allows …

Six arrested for compromising 10,000 online bank accounts

Six people have been arrested on suspicion of stealing credit cards, personal information and banking details as part of a suspected online banking fraud. On Tuesday 3 and …

AV vendors detect on average 19% of malware attacks

Traditional AV vendors continue to lag behind online criminals when it comes to detecting and protecting against new and quickly evolving threats on the Internet, according to …

Paranoid workers access corporate data on vacation

With bags packed, flights booked and foreign currency in their pockets the workforce might be jetting off but they’re definitely not leaving the daily grind behind. …

How Web frameworks kill traditional security scanning

In this video from OWASP AppSec Research 2010, Christian Hang discusses how web frameworks kill your static security scans.

Zero day initiative program updated

HP announced an enhancement to the HP TippingPoint Zero Day Initiative (ZDI) that calls for the publishing of vulnerability advisories no later than six months after flaws are …

Large Zeus botnet used for financial fraud

Trusteer announced that it has uncovered a large Zeus version 2 botnet being used to conduct financial fraud in the UK which is operated and controlled from Eastern Europe. …

CIOs prioritizing personal mobile device security

With more than half of financial services enterprises already supporting personally-owned mobile devices, a significant challenge has been introduced to most firms’ …

Faster detection coming to Snort

Sourcefire will become the first security vendor to integrate Intel’s QuickAssist Pattern Matching Technology. Snort 2.9, now in beta, leverages the Intel QuickAssist …

Rapid7 launches NeXpose 4.9

Rapid7 announced NeXpose 4.9. Now, government agencies facing Federal Information Processing Standard (FIPS) 140-2 Certification requirements, and enterprises that adopt this …

Don't miss

Cybersecurity news