What are users doing after log-in?
Businesses today use up to 50 on-premises applications and 25 cloud-based applications on average, so identity and access management (IAM) technologies to secure data and …
Backup and recovery problems exposed
A Veeam survey of 500 SMBs across the USA and Europe found that they are experiencing significant issues with the cost, complexity and lack of capabilities of their data …
Secure Windows desktops by removing administrator privileges
BeyondTrust released PowerBroker for Windows 6.0, an identity management solution that allows customers to take a system’s overall risk into context when deciding what …
Microsoft to release five bulletins next week
Microsoft released advance notification for next week’s Microsoft patch and it looks like we’re getting only five bulletins. We received several comments on what …
Rogue employees, malware exploits and unauthorized software
While IT security professionals recognize the threat posed by unwitting employees, many still admit to allowing administrative privileges to go unmanaged, making organizations …
Tripwire includes web application scanning with IP360
Tripwire announced that dynamic web application scanning is now included in IP360. This critical functionality enables customers to detect and prioritize web application …
U.S. Veterans Affairs Dept. repeatedly targeted by foreign hackers
Conflicting claims were heard at Tuesday’s hearing of the House Veterans’ Affairs oversight and investigations subcommittee, leaving open the question on whether …
Smart TVs vulnerable to a host of attacks
Smart (connected) TVs are becoming a common fixture in Western world homes, and most users consider it a handy tool and an improvement over the basic television sets of …
NSA legally forces Verizon to hand over all phone records on a daily basis
An order issued by the secret Foreign Intelligence Surveillance Court (FISC) that compels Verizon to share metadata on all the phone calls its users make with the NSA has been …
Fake Mt. Gox pages aim to infect Bitcoin users
Mt. Gox is the the largest Bitcoin exchange in the world, and as such it and its users are being repeatedly targeted by attackers. Some two months ago, it battled a massive …
Microsoft and FBI disrupt global cybercrime ring
Microsoft, the FBI, Agari, financial services industry leaders FS-ISAC, NACHA, and other industry partners, managed to break up a massive cybercrime ring which was stealing …
Most small businesses can’t restore all data after a cyber attack
Almost one-third of U.S. small businesses surveyed by the Ponemon Institute had a cyber attack in the previous year, and nearly three-quarters of those businesses were not …
Featured news
Resources
Don't miss
- Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257)
- FAPI 2.0: How the OpenID Foundation is enabling scalable interoperability in global healthcare
- pqcscan: Open-source post-quantum cryptography scanner
- Bitdefender PHASR: Proactive hardening demo overview
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)