Qualys and FireMon enable real-time network risk visibility
Qualys and FireMon announced the integration of QualysGuard Vulnerability Management (VM) and FireMon Security Manager with Risk Analyzer in FireMon’s upcoming 7.0 …
Week in review: WordPress sites under attack, Android Trojan downloaded by millions, pass-thought s instead of passwords
Here’s an overview of some of last week’s most interesting news, videos and articles: Real-world test of 21 antivirus products AV-Comparatives have released …
New Android Trojan downloaded from Google Play by millions
Millions of Android users have been tricked into downloading a new Trojan masquerading a slew or legitimate apps directly from Google Play, warns Lookout researcher Marc …
DLP suite for companies with limited IT support resources
Safetica Technologies has launched Safetica 5, the newest version of its Data Leak Protection/monitoring suite, which prevents “human factor” issues that can lead …
Sony Pictures LulzSec hacker sentenced
25-year-old LulzSec hacker Cody Kretsinger (aka “recursion”) has been sentenced to spend one year in prison for his involvement in the Sony Pictures Entertainment …
Research reveals damage that privacy breaches can cause
A global study of consumer attitudes towards company stewardship of personal data conducted by the Economist Intelligence Unit shows that data breaches can cause major damage …
Cloud-based email threat protection from Dell
Dell announced SonicWALL Hosted Email Security 2.0, a cloud-based service providing multi-layered email threat protection backed by 24/7 online and phone support. Dell Email …
Unlocking MS Office 2007/2010 documents
Cloud-based password unlocking service Password-Find introduced a new decrypting algorithm that unlocks half of Microsoft Office 2007/2010 Word, Excel, and PowerPoint …
Widely used routers easy to hack even by remote attackers
Security researchers from Independent Security Evaluators have tested thirteen widely used small office/home office routers and wireless access points, and have discovered …
Microsoft rolls out optional two-step authentication
Microsoft has announced that it will be upgrading the Microsoft account and that this upgrade will include an optional two-step verification feature. “More than a year …
Encrypted e-mail service from Silent Circle
Silent Circle announced the availability of the company’s new Silent Mail e-mail encryption service. Silent Mail addresses longstanding problems with e-mail encryption: …
Free endpoint backup for small teams
Druva introduced free IT-managed endpoint backup for groups of up to 15 users with a new edition of Druva inSync, its integrated suite of backup, file sharing, data loss …
Featured news
Resources
Don't miss
- The defense industrial base is a prime target for cyber disruption
- Everyone uses open source, but patching still moves too slowly
- Cybersecurity in cross-border logistics operations
- SecureClaw: Dual stack open-source security plugin and skill for OpenClaw
- Design weaknesses in major password managers enable vault attacks, researchers say