The Internet of Things: Key Applications and Protocols
The Internet of Things describes the Home Area Networking, Building Automation and AMI protocols and their evolution towards open protocols based on IP such as 6LowPAN and …
The rise of information stealers and pay-per-install malware
The fastest growing malware categories in the second half of 2011 were PPI (Pay-Per-Installs) and information stealers that target user credentials enabling the theft of key …
The new and improved Kelihos botnet
As announced by Kaspersky Lab researchers and confirmed by Microsoft, the C&C and backup infrastructure of the original Kelihos/Hlux botnet is still down after their …
The escalating cost of US cybersecurity plans
When US President Barack Obama called on the Congress for laws that would protect the country’s citizens, businesses and infrastructure from various cyber threats, it …
“Facebook will end on March 15th” hoax spreading quickly
Hoaxes claiming that Facebook will shut down or stop being a free service are regularly propagated through the social network, raising panic with users who haven’t …
ISO 27001 video tutorials
One of the biggest obstacles for companies starting to implement ISO 27001 is writing various documents required by this information security standard. Information Security …
Confidential data at risk even with policies in place
Think confidential information is protected by company IT security policies? Think again. A new survey by Xerox and McAfee, reveals that more than half of employees say they …
Intel details next-generation communications platform
Intel disclosed several features for the company’s next-generation communications platform, codenamed Crystal Forest. The platform will handle data processing across the …
Protect data by finding forgotten databases
Application Security declared that organizations can no longer afford to guess or assume that they have their database inventory under control. Based on the premise that you …
Practical Malware Analysis
Malware. You know what it is. Perhaps you’ve even fought a malware infection or two. Wouldn’t it be nice if the good guys finally had one really complete guide to …
Web filtering technology with next-generation firewall capabilities
Barracuda Networks announced the integration of the Barracuda NG Firewall and Barracuda Web Security Flex. This solution combines cloud-based Web filtering technology with …
Mozilla wants CAs to stop issuing and revoke MITM certificates
A heated debate has unfolded after Trustwave made public their decision to revoke a subordinate root certificate it issued to a company that allowed it to intercept their …
Featured news
Resources
Don't miss
- Prioritizing data and identity security in 2025
- eBook: What does it take to be a full-fledged virtual CISO?
- Building cyber resilience in banking: Expert insights on strategy, risk, and regulation
- CISO vs. CIO: Where security and IT leadership clash (and how to fix it)
- Why a push for encryption backdoors is a global security risk