Please turn on your JavaScript for this page to function normally.
95% of financial institutions vulnerable to data theft

TraceSecurity revealed today its five-year statistics on social engineering and penetration testing. The statistics show that 95% of U.S. financial institutions’ …

Google takes another step to protect user privacy

Google announced a new logs retention policy. They pledge to anonymize IP addresses on their server logs after 9 months. That’s a significant shortening of their …

Types of Web-Based Client-Side Attacks

While my research is primarily concerned with drive-by-download attacks, I thought I try to summarize other web-based client-side attacks that are out there, many of which are …

Doubling of the number of crimeware-spreading URLs

The APWG announced today that its first quarter survey reveals a near doubling of the number of crimeware-spreading URLs at the end of the period, up from the previous record …

World’s first unclonable RFID chip

Verayo launched the world’s first unclonable silicon chip – the Vera X512H RFID chip. This new RFID chip is based on recently announced breakthrough technology …

Inbound threat protection and outbound content security platform

BorderWare Technologies introduced BorderWare Security Platform 8.0, the industry’s first security appliance to provide comprehensive email and Web security with …

Advanced hybrid location solution

Polaris Wireless announced the Polaris Wireless Advanced Hybrid Solution which is designed to work in conjunction with A-GPS systems to consistently provide the highest …

SOX, Lies and Security Matters

When it comes to compliance, it’s fairly easy to find out what companies need to do to achieve it. But it’s much harder for companies to find out how they should …

Spam served as visual poetry

Alex Eckelberry posted some interesting screenshots to the Sunbelt Blog. As Alex notes, they show a cute way of bypassing the filters: If you select the text, you see …

IT security spending on the rise

Spending on IT security will continue to grow next year, according to new data unveiled by Forrester Research. The Forrester Business Data Services survey, which polled more …

Computers increasingly being infected by fake antivirus products

Panda Security’s laboratory for detecting and analyzing malware, has noted an increase in the use of malware under the guise of fake antivirus products to defraud users. …

The state of malware – August 2008 edition

Fortinet announced the top 10 most reported high-risk threats for August 2008. Malware W32/Multidr.JD!tr and HTML/Agent.HFZ!phish, disguised as security software AntiVirus XP …

Don't miss

Cybersecurity news