Critical vulnerabilities in popular DDoS toolkit exposed
Prolexic Technologies exposed weaknesses in the command and control (C&C) architecture of the Dirt Jumper DDoS Toolkit family that could neutralize would-be attackers. …
Organizations lack protocols to protect data in the cloud
While sixty-two percent of survey respondents are leveraging the cloud and/or virtualization, only 33 percent of these organizations test data recovery plans regularly to …
Huge jump in number of fines for data breaches
The Information Commissioner’s Office (ICO) has revealed a huge increase in the number of penalties handed out for organisations in breach of the Data Protection Act. …
Cyber-Ark enhances security of files in-transit
Cyber-Ark Software announced version 7 of its Sensitive Information Management Suite to support secure file exchange environments. The suite isolates sensitive data sent over …
Microsoft releases nine comprehensive security bulletins
Microsoft released nine comprehensive security bulletins as part of its regular update cycle. At the top of the Microsoft list is another MSCOMCTL related bug. Last patched in …
Website analyzes and rates convoluted Terms of Service
When signing up for an online service, users are required to read and agree to the presented Terms of Service (ToS). But these terms often go on and on, and are written in …
Who is using the commercial cyberespionage tool FinFisher?
Malware development has long stopped being the exclusive domain of individuals and groups looking for strictly fame or money. As years passed and everybody and everything went …
BackTrack 5 R3 released
BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to …
Imation updates line of hardware encrypted USB hard drives
Imation announced the expansion of its secure USB hard drive line with capacities of up to 1 terabyte (TB), optional biometric fingerprint authentication, and a set of options …
Facebook deceived developers and users with Verified Apps program
The privacy settlement that the US Federal Trade Commission and Facebook agreed on last November has been finalized on Friday and, unlike Google earlier that week, Facebook …
BYOD reality: Missing mobile device usage policies
Gone are the days when employees only used a company-issued phone or laptop for work. Today, employees bring personal smartphones and tablets to the office and often have …
Citadel Trojan targets airport employees with VPN attack
Trusteer have recently discovered a sophisticated Man in the Browser (MitB) enterprise attack that targets VPN users at a major international airport hub. Using the Citadel …
Featured news
Sponsored
Don't miss
- Scammers dupe chemical company into wiring $60 million
- Australian gold mining company hit with ransomware
- Browser backdoors: Securing the new frontline of shadow IT
- Key metrics for monitoring and improving ZTNA implementations
- Chrome, Edge users beset by malicious extensions that can’t be easily removed