Cross-site scripting attacks up 160%
Each quarter, FireHost reports on the Superfecta – a group of four cyberattacks that are the most dangerous – and warns that both Cross-Site Scripting and SQL …
The dangers of third-party code for cloud security
Imperva announced a new report which examines the dangers of third-party code in cloud computing. In December 2012, a hacker breached Yahoo! with an SQL injection attack that …
48% of IT staff fear unauthorized access to virtual servers
Data security in visualized environments is often neglected by IT organizations, with 48% either reporting or suspecting unauthorized access to files on visualized servers, …
HP helps organizations define a security strategy
HP announced a new set of security services that help organizations respond to, remediate and mitigate the impact of security breaches as they occur. Security breaches are …
cPacket Networks unveils network performance and monitoring solution
cPacket Networks announced a new network performance and monitoring solution that radically simplifies the way in which cloud and data center professionals pinpoint issues. …
U.S. DoD’s cybersecurity force to increase fivefold
The Pentagon is poised to start searching for more than 4,000 new employees for the Defense Department’s Cyber Command, in a bid to boost its cyber defensive and …
Events that defined the European information security landscape in 2012
The past 12 months have been, to say the least, an active time for the information security landscape in Europe. Hacktivism stories dominated mainstream media outlets, the …
Facebook’s CPO tackles privacy policy questions
When late last year Facebook changed its Statement of Rights and Responsibilities and Data Use Policy, the social network’s users lost their right to vote on future …
Encrypted video and texting for iPhone and iPad
ZipaClip is a secure mobile video and texting application for iOS devices. The free version of ZipaClip allows users to send and receive fully-encrypted texts and video clips …
Trojan uses anti-spam system to keep in touch with C&C servers
Most malware is severely crippled if it can’t contact the C&C servers from which it receives its instructions and updates, so malware authors are constantly coming …
How taxpayers can protect themselves against identity theft
ThreatMetrix has identified the top precautions taxpayers should take when e-filing to protect their returns against cybercriminals. According to Forbes, more than 80 percent …
AV developer Avast starts bug bounty program
Avast, the Prague-based maker of the popular eponymous AV software, has announced the introduction of a bug bounty program. Rewards are offered only for security-related bugs …
Featured news
Sponsored
Don't miss
- Critical RCE bug in SolarWinds Web Help Desk fixed (CVE-2024-28986)
- How passkeys eliminate password management headaches
- Delta vs. CrowdStrike: The duties vendors owe to customers – or do they?
- IntelOwl: Open-source threat intelligence management
- Current attacks, targets, and other threat landscape trends