Please turn on your JavaScript for this page to function normally.
Exploitability data from real-time feeds

Qualys announced that QualysGuard Vulnerability Management now includes correlated exploitability information from real-time feeds to provide customers with up-to-date …

P2P increasingly favored by malware attackers

Cisco released its 2Q10 Global Threat Report, which is an aggregation of data and insights on threats from Cisco Security Intelligence Operations. The report merges the most …

PC surveillance software for Terminal Servers

Refog announces the release of Refog Terminal Monitor, a centralized software-based employee tracking system for the Terminal Server allowing administrators to track employee …

The impact of structural vulnerabilities on enterprise websites

Dasient released a new research report, “Structural Vulnerabilities on Websites: Why Enterprise Websites Are Vulnerable to Malware Attacks,” which found that, …

Free tool to protect against Windows “.LNK” zero-day flaw

Sophos has released the Sophos Windows Shortcut Exploit Protection Tool, which protects against a vulnerability that allows malicious hackers to exploit a bug in the way that …

Managing your identity, secure access and online storage while protected by the cloud

Webroot announced Webroot Internet Security Complete, the company’s newest consumer offering that integrates cloud-based threat protection with identity management and …

APWG launches offline phishing education program

The Anti-phishing Working Group has contributed its expertise in online fraud to the Internal Revenue Service with the creation of a new consumer fax education initiative to …

Week in review: Adobe Reader sandbox, Stuxnet worm and a new 0-day Windows vulnerability

Here’s an overview of some of last week’s most interesting news, reviews, articles and videos: 10 steps for safe web surfing This is a good time for vacation-goers …

Browser-enforced mitigation against CSRF

This is a video of a talk by Lieven Desmet and Philippe De Ryck at OWASP AppSec Research 2010.

Reporting of security breaches should be included in regular reports

Reports that a leading legal expert has called for the mandatory reporting of all data breaches to the UK Information Commissioner’s Office (ICO) – in order to …

Snort 2.8.6.1 released

Snort is an open source network intrusion prevention system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol …

New book: “Ubuntu for Non-Geeks, 4th Edition”

Ubuntu has been hailed as the Linux distribution for newbies, but getting it up and running isn’t always a walk in the park. Linux is different—but the same unique …

Don't miss

Cybersecurity news