IT industry business confidence remains flat
IT companies express tempered optimism heading into the first quarter of the year, though longer-term prospects look more promising. CompTIA projects a worldwide IT industry …
Cloud-based fuzzing for zero-day vulnerability discovery
Codenomicon released the Fuzz-o-Matic cloud-based software security Testing-as-a-Service (TaaS) platform for enterprise software and applications running on Windows, Linux, …
Comprehensive Java testing solution
Parasoft introduced a new release of Parasoft Jtest: a comprehensive Java testing solution that automates static analysis, unit testing, coverage analysis, runtime error …
Google+: The Missing Manual
If you want to gain more control over your social networking activities with Google+, this jargon-free guide helps you quickly master the ins and outs of the site. Learn how …
Hacker allegedly leaks 100K Facebook account credentials of Arab users
The slew of hacks, leaks of credit card information, DDoS attacks and defacements executed by Arab and Israeli hackers that transferred part of the longstanding, real world …
Researchers discover network of 7,000 typo squatting domains
A network of some 7,000 typo squatting domains is being used by scammers to effectively drive traffic towards their scammy sites, some of which get so much traffic that they …
IT managers express concerns over tablet security
Cisco commissioned a survey 1500 IT managers and executives in the US, Canada, UK, France, Germany and Spain to assess attitudes, fears and hopes for tablets in the workplace. …
Criminals stole $3.4B from online revenues in 2011
Merchants are making gains against fraud but the battle continues, according to CyberSource, a Visa company. The fraud rate by order (the percentage of orders that turned out …
Security for virtualized and cloud computing
Catbird announced vSecurity 5.0 that integrates directly with the hypervisor to provide automated control, visibility and efficiency. Its vCompliance engine monitors and …
Pwn2Own 2012: Changed rules, bigger prizes, no more mobile hacks
Pwn2Own, one of the most anticipated hacking contests that takes place each year at the CanSecWest conference in Vancouver, British Columbia, is set to unfold under …
Kelihos malware author, botnet herder named by Microsoft
Microsoft has named a new defendant in the ongoing Kelihos case. His name is Andrey N. Sabelnikov, of St. Petersburg, Russian Federation, and is believed to have written the …
Unique Web malware hosts increase
The proper security tools can prevent infection or stop outbreaks, mitigate or reduce losses from malicious events, and even decrease legal liability. These products can also …
Featured news
Resources
Don't miss
- Building cyber resilience in banking: Expert insights on strategy, risk, and regulation
- CISO vs. CIO: Where security and IT leadership clash (and how to fix it)
- Why a push for encryption backdoors is a global security risk
- Innovation vs. security: Managing shadow AI risks
- Commix: Open-source OS command injection exploitation tool