Help Net Security
95% of financial institutions vulnerable to data theft
TraceSecurity revealed today its five-year statistics on social engineering and penetration testing. The statistics show that 95% of U.S. financial institutions’ …
Google takes another step to protect user privacy
Google announced a new logs retention policy. They pledge to anonymize IP addresses on their server logs after 9 months. That’s a significant shortening of their …
Types of Web-Based Client-Side Attacks
While my research is primarily concerned with drive-by-download attacks, I thought I try to summarize other web-based client-side attacks that are out there, many of which are …
Doubling of the number of crimeware-spreading URLs
The APWG announced today that its first quarter survey reveals a near doubling of the number of crimeware-spreading URLs at the end of the period, up from the previous record …
World’s first unclonable RFID chip
Verayo launched the world’s first unclonable silicon chip – the Vera X512H RFID chip. This new RFID chip is based on recently announced breakthrough technology …
Inbound threat protection and outbound content security platform
BorderWare Technologies introduced BorderWare Security Platform 8.0, the industry’s first security appliance to provide comprehensive email and Web security with …
Advanced hybrid location solution
Polaris Wireless announced the Polaris Wireless Advanced Hybrid Solution which is designed to work in conjunction with A-GPS systems to consistently provide the highest …
SOX, Lies and Security Matters
When it comes to compliance, it’s fairly easy to find out what companies need to do to achieve it. But it’s much harder for companies to find out how they should …
Spam served as visual poetry
Alex Eckelberry posted some interesting screenshots to the Sunbelt Blog. As Alex notes, they show a cute way of bypassing the filters: If you select the text, you see …
IT security spending on the rise
Spending on IT security will continue to grow next year, according to new data unveiled by Forrester Research. The Forrester Business Data Services survey, which polled more …
Computers increasingly being infected by fake antivirus products
Panda Security’s laboratory for detecting and analyzing malware, has noted an increase in the use of malware under the guise of fake antivirus products to defraud users. …
The state of malware – August 2008 edition
Fortinet announced the top 10 most reported high-risk threats for August 2008. Malware W32/Multidr.JD!tr and HTML/Agent.HFZ!phish, disguised as security software AntiVirus XP …
Featured news
Sponsored
Don't miss
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage
- What CISOs need to keep CEOs (and themselves) out of jail
- Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave
- Leveraging dynamic configuration for seamless and compliant software changes