New Zeus/SpyEye makes bots function as C&C servers
The latest build of the Zeus/SpyEye malware shows a change that could very well hamper the security researchers’ ability to take down the botnets using it and to find …
Users don’t bother changing default passwords
Most people working with sensitive information want stricter security policies but rarely bother changing default, automatically generated and assigned passwords. To collect …
ISO 27001 and BS 25999-2: Why is it better to implement them together?
Lots of companies implementing ISO 27001 struggle how to implement the requirements from Annex A.14 – Business continuity management. The problem is that ISO 27001 does …
Security toolkit for online mobile applications
KOBIL Systems introduced mIDentity App Security Toolkit, which protects mobile users from security attacks. KOBIL offers two reference implementations of this toolkit: …
Akamai protects enterprises from DDoS and application security attacks
Akamai Technologies introduced Akamai Kona Site Defender, a service designed to protect the brand value of companies by shielding their web sites, applications and associated …
Novell integrates Mac device management
Novell announced the availability ZENworks 11 Support Pack 2 which includes integrated device management for Mac, and introduces a new product offering with ZENworks Full Disk …
Security platform uses virtual machine introspection
CounterTack announced three new solutions available on Event Horizon, a security platform utilizing virtual machine introspection (VMI), to help organizations identify, …
Self-selected PINs aren’t that hard to guess
Four-digit banking PINs are usually randomly assigned by banks after the issuing of credit and debit cards, but there are still some out there that let its customers choose …
Fake RIAA copyright violation notification serves malware
First spotted nearly a week ago, notifications of copyright violation supposedly sent by the Recording Industry Association of America are still hitting inboxes around the …
Apache HTTP Server 2.4 released
Celebrating its 17th anniversary with an all-time record of nearly 400 million Websites powered worldwide, the Apache Software Foundation announced version 2.4 of the Apache …
Microsoft says Google also bypassed IE’s privacy settings
Following the discovery that Google and other online advertising companies are bypassing Safari’s default “no tracking” settings with specific code inserted …
yaSSL offers new open source security tools
yaSSL has made IT-level security tools available for the open source community, ensuring that mature, advanced security tools like Kerberos, wpa_supplicant, and OpenSSH are …
Featured news
Resources
Don't miss
- Prioritizing data and identity security in 2025
- eBook: What does it take to be a full-fledged virtual CISO?
- Building cyber resilience in banking: Expert insights on strategy, risk, and regulation
- CISO vs. CIO: Where security and IT leadership clash (and how to fix it)
- Why a push for encryption backdoors is a global security risk