Blizzard confirms hack, urges users to change passwords
Blizzard’s CEO Mike Morhaime has confirmed in a letter that the company’s internal network has been breached this week. The “unauthorized and illegal …
Stuxnet cousin able to attack industrial control systems
Today, extensive analysis on a new cyber espionage weapon dubbed “Gauss’ has been released, stating that the tool has capabilities to attack national critical …
Microsoft to release nine bulletins on Tuesday
For the second month running, Microsoft’s Patch Tuesday Advanced Notification includes nine bulletins. This month, five are rated “critical’ and four …
NIST updates guide for dealing with computer security incidents
The National Institute of Standards and Technology (NIST) has published the final version of its guide for managing computer security incidents. Based on best practices from …
Performance tuning Windows Server 2012
Microsoft released a comprehensive paper that describes important tuning parameters and settings that you can adjust to improve the performance and energy efficiency of the …
Insight on social software and big data analytics
Teradata and Mzinga announced the results of a recent industry survey exploring the use of social technologies and big data analytics in business. The survey’s primary …
ESET updates products for OS X Mountain Lion
ESET announced that ESET Cybersecurity for Mac and ESET NOD32 Antivirus Business Edition for Mac OS X have been updated to be fully compatible with OS X Mountain Lion. These …
CISSP Study Guide, 2nd Edition
The CISSP certification is a globally-recognized, vendor neutral exam for information security professionals. The newest edition of this study guide is aligned to cover all of …
BYOD increases costs for most organizations
The results of a study by Lieberman Software Corporation confirms that BYOD (bring your own device) increases costs to businesses. Respondents were asked if they believed …
Nepalese government websites serving backdoor
Two websites belonging to the Nepalese government have been injected with malicious code that tries to take advantage of a Java vulnerability (CVE-2012-0507) in order to …
Defense contractor targeted with “sexy” spam carrying malware
Targeted spam campaigns take many forms and take advantage a variety of natural human responses and feelings such as curiosity, fear, or lust. This last one spotted bet on the …
Rapid7 Nexpose introduces IPv6 discovery and scanning capabilities
Rapid7 announced that the new version of its vulnerability management solution, Rapid7 Nexpose, introduces features for discovering and scanning IPv6 assets that organizations …