Improve your firewall auditing
As a penetration tester you have to be an expert in multiple technologies. Typically you are auditing systems installed and maintained by experienced people, often protective …
Fraudulent digital certificate for Google web properties used in active attacks
A fraudulent digital certificate that could be used to spoof content, perform phishing attacks, or perform man-in-the-middle attacks against several Google web properties has …
Rapid-fire changes to information security strategies
RSA released a special report from the Security for Business Innovation Council (SBIC) that assesses how disruptive innovations such as Big Data analytics, cloud computing, …
All Ruby on Rails versions affected by SQL injection flaw
Three new versions of popular open source web application framework Ruby on Rails have been released on Wednesday in order to fix an SQL injection vulnerability that affected …
Video surveillance for critical IT systems
NetWrix has announced its new User Activity Video Reporter tool that acts like a surveillance camera for critical servers and other IT systems by recording user activity for …
Bad Data Handbook
What is bad data? Some people consider it a technical phenomenon, like missing values or malformed records, but bad data includes a lot more. In the Bad Data Handbook, data …
IT GRC auditor outlines trends for the new year
As the new year kicks off, Coalfire, an independent IT GRC auditor, compiled their predictions for cybersecurity in 2013. “Last year was a very active year in the …
Worldwide IT spending to reach $3.7 trillion in 2013
Worldwide IT spending is projected to total $3.7 trillion in 2013, a 4.2 percent increase from 2012 spending of $3.6 trillion, according to the latest forecast by Gartner. The …
Ubuntu comes to the phone
Canonical announced a smartphone interface for its operating system, Ubuntu, using all four edges of the screen for a more immersive experience. Ubuntu gives handset OEMs and …
IE zero-day used in targeted watering hole attacks
News that an Internet Explorer zero-day vulnerability was being and has been for quite some time been used in a new “watering hole” attack has livened the …
The threat landscape continues to expand rapidly
ThreatMetrix announced cybersecurity trends and risks businesses and consumers must keep top of mind in 2013. These include cyberwarfare, data breaches, migrating malware, …
Database hacking: The year that was
Have you ever been to the Privacy Rights Clearinghouse site? It tallies all the data breaches that have occurred in United States since 2005. What you read there is really …
Featured news
Resources
Don't miss
- Logitech confirms data breach
- Five men admit helping North Korean IT workers infiltrate US companies
- The tech that turns supply chains from brittle to unbreakable
- Strix: Open-source AI agents for penetration testing
- Product showcase: SecAlerts – Relevant, actionable, up-to-the-minute vulnerability alerts