Automate security policy management for business applications
AlgoSec announced BusinessFlow, a new product that automates security policy management for business applications and provides the link between application connectivity …
Georgia shows photos of Russian-based hacker spy
A Russian-based hacker has been unmasked as one of the attackers behind a long-standing campaign aimed at compromising computers belonging to Georgian ministries, parliament, …
Can the Nuclear exploit kit dethrone Blackhole?
In a market dominated by the mega-popular Blackhole exploit kit (newly upgraded to version 2.0) and the somewhat less sought-after Eleonore and Phoenix exploit packs, can the …
Bank of America customers under phishing attack
Bank of America customers, beware – the old “account suspended” warning purportedly sent by your bank’s Cardmember Services is hitting inboxes once …
Gang steals over $1M by exploiting Citigroup e-payment flaw
Fourteen individuals were charged following a FBI-led investigation into the theft of over $1 million from Citibank using cash advance kiosks at casinos located in Southern …
Application Security updates its database scanning tool
Application Security announced the latest release of its database scanning tool, AppDetectivePro. Expanded capabilities and a new user interface provide security, risk and IT …
Secunia Vulnerability Intelligence Manager 4.0 released
The Secunia VIM 4.0 covers more than 40,000 software systems and applications. Its provides intelligence about software vulnerabilities available to organizations, ensuring …
Microsoft’s worldwide threat assessment
In this podcast recorded at RSA Conference Europe 2012, Tim Rains, the Director of Product Management at Microsoft’s TWC group, talks about volume 13 of …
EMC to acquire Silver Tail Systems
EMC has signed a definitive agreement to acquire Silver Tail Systems, a provider of real-time web session intelligence and behavioral analysis. Terms of the deal were not …
Interactive CERT map from ENISA
ENISA has published a new interactive CERT map and Inventory of CERT’s activities in Europe containing publicly listed teams and co-operation, support and …
Trojan Horse: A Novel
It’s two years after the Zero Day attacks, and cyber-security analyst Jeff Aiken is reaping the rewards for crippling Al-Qaida’s assault on the computer …
Facebook investigates data leak from 1 million accounts
Facebook will be launching an internal investigation following the revelation by Czech blogger Bogomil Shopov that data belonging to over one million Facebook users was …