Please turn on your JavaScript for this page to function normally.
Serious Mac OS X vulnerabilities patched

Apple released Security Update 2010-001 which improves the security of Mac OS X. CoreAudio A buffer overflow exists in the handling of mp4 audio files. Playing a maliciously …

81% of organizations lack visibility into network traffic

According to a new research report by Enterprise Management Associates, insufficient network monitoring coverage is a pervasive and growing problem among enterprises, …

Scammers aggressively targeting Haiti donations

A week after the devastating Haiti quake, scammers are working harder than ever to exploit the good will of people that want to help the victims by giving donations. The FBI …

Data security for Mac users

PGP announced the latest version of PGP Desktop for Mac which now also supports Boot Camp, so users can have complete protection for machines running dual Mac OS X and Windows …

Worldwide infrastructure security

Arbor Networks, in cooperation with the Internet security operations community, has completed the fifth edition of an ongoing series of annual operational security surveys. …

Patch management simplified

Patching of vulnerable software, in particular third party software, which isn’t supported by Microsoft WSUS, has been a cumbersome and resource demanding process, …

Rogue software details: Win Security 360

Win Security 360 is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\Desktop\Win …

IT budgets in 2010 to be at 2005 levels

IT budgets will essentially be flat in 2010, increasing by a weighted global average of 1.3 percent in nominal terms, compared with 2009 levels where IT budgets declined 8.1 …

Secure computing on a USB flash drive

The new IronClad USB drive shrinks a laptop’s hard drive – including the entire operating system, software applications, and files – onto a secure flash …

Four information management roles IT departments need

Gartner has identified four information-management roles that IT departments need to establish and recruit from outside the IT team in a major trend that will affect both IT …

Identity theft in focus

The stories are all too familiar: Money siphoned from a checking account. Unfamiliar charges racked up on a credit card bill. Discovering a loan has been taken out under false …

Week in review: Google and Adobe hacked by China, threats 2.0 and rogue Android applications

Here’s an overview of some of last week’s most interesting news and articles: Pay by password Verotel announced Verotel QuickCharge – a new tool for Internet …

Don't miss

Cybersecurity news