Researchers reveal tricks for Cutwail’s endurance
While some botherders have opted for the arguably much safer P2P architecture in order to assure their botnets’ resilience, others are still clinging to the standard …
Dell Software tackles the risk of software compliance
The Dell KACE K1000 Management Appliance now includes integrated software asset management to boost software licence compliance. With this latest release, the K1000 simplifies …
Concern about cloud security is nothing new
A recent survey shows that even before PRISM news broke, six out of ten consumers were concerned about the security of storing their content in social networking and cloud …
Google implements malware scan for submissions to Chrome Web Store
Late last week, Google has announced that submissions to the Chrome Web Store will, from now on, be checked for malware. Mimicking the Android Bouncer program incorporated …
The state of risk-based security management
A new Ponemon Institute survey covers risk-based security management program governance and maturity and includes 571 U.K. and 749 U.S. respondents from the following areas: …
Nearly 200,000 new malware samples appear daily
Most companies greatly underestimate the number of new malicious programs appearing daily, and only six per cent recognize the true scale of the threat, according to B2B …
Snowden on the run, leaks continue unabated
The chase is on for whistleblower Edward Snowden and the U.S. government. After legally leaving Hong Kong for Moscow, and despite having his U.S. passport revoked, the former …
Bitcoin Foundation hit with cease and desist order
The Bitcoin Foundation has received a cease and desist letter from the California Department of Financial Institutions, saying that they have been informed that the …
International cooperation in the fight against cybercrime
Today’s cyber threats are becoming increasingly more targeted and sophisticated with criminal networks operating across the world, coordinating complex attacks against …
Facebook bug discloses user info, existence of shadow accounts
6 million Facebook users have been affected by a flaw that resulted in the email addresses and phone numbers associated with their accounts being shared with any friend and …
Android fake AV demands ransom, crashes
Fake AV software and ransomware are old news for computer users, but are now poised to become a problem for smartphone users as well. Symantec researchers have recently …
Recommendations for securing Active Directory
Active Directory plays a critical role in the IT infrastructure, and ensures the harmony and security of different network resources in a global, interconnected environment. …
Featured news
Resources
Don't miss
- Salesforce Gainsight compromise: Early findings and customer guidance
- Research shows identity document checks are missing key signals
- How one quick AI check can leak your company’s secrets
- Salesforce investigates new incident echoing Salesloft Drift compromise
- Security gap in Perplexity’s Comet browser exposed users to system-level attacks