How to spot APT attacks
With the proliferation of Advanced Persistent Threats (APTs), it’s paramount for those who are charged with defending the systems and networks of likely targets to know …
Investigating clever scamming techniques and their evolution
Christopher Boyd is a Senior Threat Researcher for GFI Software. Chris has been credited for finding the first instance of a rogue Web browser installing without permission, …
Video: Data mining a mountain of vulnerabilities
Every day, software developers around the world, from Bangalore to Silicon Valley, churn out millions of lines of insecure code. Veracode used static binary analysis on …
Google searching for hardware alternatives to passwords
Passwords are on the way out, it seems. With current boom – and obvious success – of phishing, it’s time to see what could be a better alternative to this …
GFI EventsManager now with active monitoring
GFI Software announced that GFI EventsManager now includes the active network and server monitoring capabilities found in the NetworkServerMonitor solution. This new …
McAfee outlines the future of business security
McAfee announced its strategy for building upon Security Connected, the framework in which security products and services work together to safeguard businesses with better …
New nCircle security appliance cuts vulnerability scan time
nCircle announced the Device Profiler 4000 (DP 4000), a high performance vulnerability scanning appliance designed to support vulnerability scanning requirements including web …
Student checks software for critical bug, gets expelled from college
When 20-year-old Ahmed Al-Khabaz, a computer science student at Montreal’s Dawson College, discovered a critical flaw in his college’s student web portal, he …
What makes a good information security professional?
Information security is a very competitive industry, and one of the very few that kept doing fine even during the recession. It’s also a dynamic field that promises a …
Proposed EU cyber security law will require proactive network security
Last week, the European Commission proposed new legislation to require major tech firms like Google and Facebook to report any security breaches to local cyber crime …
Fake game apps flood Google Play
Android users are once again in danger of getting their information collected and being hit by an unending stream of spam and unwelcome offers just because they searched for …
PowerDNS 3.2 expands DNSSEC support
The PowerDNS Authoritative Server enables authoritative DNS service from all major databases, including but not limited to: MySQL PostgreSQL Oracle SQLite LDAP DB2 Sybase …
Featured news
Resources
Don't miss
- Vulnerable firmware for Gigabyte motherboards could allow bootkit installation
- AsyncRAT evolves as ESET tracks its most popular malware forks
- Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech
- Securing vehicles as they become platforms for code and data
- How service providers can turn cybersecurity into a scalable MRR engine