Traditional security models becoming exhausted
The Nexus of Forces is transforming the approach towards information security as new requirements are brought about by social, mobile, cloud and information. Gartner predicts …
Protect data before sending it to the cloud
IBM inventors have developed a technique for protecting sensitive data prior to transmitting it to the cloud. The patented invention will overcome barriers to client adoption …
IPS still mainly deployed at the perimeter, doing a good job
SANS announced the results of a new survey on network security sponsored by HP. 439 survey responses show that IPS is still mainly deployed at the perimeter and is doing a …
Week in review: PHP.net compromise, Facebook data mining, and how to social engineer a social network
Here’s an overview of some of last week’s most interesting news, podcasts, videos and articles: The Basics of Web Hacking: Tools and Techniques to Attack the Web …
Bypassing security scanners by changing the system language
A substantial security oversight is present in a variety of penetration testing tools, and it has to do with the different languages that a computer system can be set up to …
WordPress 3.7 delivers important architectural updates
WordPress 3.7, named Basie, is available for download or update in your WordPress dashboard. Updates include: Updates while you sleep: With WordPress 3.7, you don’t have …
Mozilla releases add-on to reveal online data tracking
With a new version (1.0.2) released on Wednesday, Mozilla has once again put the spotlight on its Collusion add-on that aims to show users which first and third parties are …
PHP.net compromised to serve malware
On Thursday, Google’s Safe Browsing service began warning visitors to php.net that the website was discovered serving malware. Initially, most people and PHP maintainers …
Cloud strategies and adoption
The use of cloud computing is growing, and by 2016 this growth will increase to become the bulk of new IT spend, according to Gartner. 2016 will be a defining year for cloud …
Exploring the dangers of a mobile lifestyle
We live in an increasingly digital world, and rely on the devices we use to store our more or less valuable information and to perform critical tasks. In fact, according to a …
Insider threat: Users are out of control
Employees are granted excessive privileges and access for their particular roles resulting in unnecessary risks to organizations. One of the most startling statistics from a …
Microsoft releases Sigcheck 2.0
Sigcheck is a command-line utility that shows file version number, timestamp information, and digital signature details, including certificate chains. Version 2.0 adds …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)