Virtualization Security: Protecting Virtualized Environments
Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and …
16 arrested for $25M worth credit card theft, fraud
Sixteen individuals allegedly involved in a credit card information theft ring have been arrested in Romania during a series of raids, the Romanian Directorate for …
Facebook users will vote on policy changes, possibly for the last time
When Facebook recently announced that it plans to change the way users can influence changes on its privacy policy, privacy advocates were not amused. The Electronic Privacy …
Malicious ads lead to fake browser updates
Every now and then, malware peddlers employ the “Your browser is out of date, download the update here” approach to saddling inexperienced users with their …
Five priority areas for future U.S. homeland security focus
On the heels of the tenth anniversary of the creation of the U.S. Department of Homeland Security (DHS), Booz Allen Hamilton outlined five priority areas for the next decade …
Real-world cyber city used to train cyber warriors
SANS announced NetWars CyberCity, a small-scale city located close by the New Jersey Turnpike complete with a bank, hospital, water tower, train system, electric power grid, …
Most Americans uninformed about DDoS attacks
Whether motivated by an extreme form of free expression or criminal intent, distributed denial-of-service attacks (DDoS attacks) are increasingly commonplace worldwide. Yet …
Webroot adds anti-phishing to Web Security Service
Webroot announced the integration of anti-phishing capabilities into the Webroot Web Security Service, a cloud-based security service. The challenges in the detection of …
Fake Windows 8 key generators lurk in the wild
Users who are eager to try out the new Windows 8 but are not keen on buying it should be careful if searching for bootlegged copies or purported key generators online, Trend …
Fraud 101 for universities
“Colleges and universities are becoming more aware of the fraud threats they face, but there is still a lot of room for educating the educators,” says James Gifas, …
Dell updates cloud software for iPad and Windows RT
Dell announced enhancements to its PocketCloud app portfolio, which enables users to easily create a “personal cloud” to search, view, organize, and share content …
Xen Cloud Platform 1.6 released
Xen Cloud Platform is a virtualization platform for companies to create and manage virtual infrastructures for servers, desktops and clouds. XCP 1.6 strengthens its server …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits