Most firms don’t coordinate security planning
Despite the potentially crippling impact of security events on corporate performance, many executives report that their security function is not well coordinated with …
New analytics advance IBM security intelligence portfolio
IBM is extending its proven security services portfolio to include enhanced analytic tools and services to provide deeper, real-time analysis of advance threats. By detecting …
IT Operations Analyzer gets expanded monitoring capabilities
Hitachi announced a new version of its IT Operations Analyzer, an integrated availability and performance monitoring tool that can help reduce complexity, streamline …
Kelihos, Waledac and Storm malware believed to have same author
The recent takedown of the Kelihos botnet by Microsoft has received a lot of attention, despite the fact that the botnet is rather small (around 41,000 computers located …
eBay hacker receives 3-year suspended sentence
The Romanian hacker who repeatedly hacked eBay servers, accessed parts of its sites that were off-limits to users and even accessed a number of eBay accounts has been handed …
Unique malware URLs increased 89 percent
Websites loaded with malware increased a massive 89 percent in the third quarter compared to Q2 2011. According to an IID report, the most impersonated organizations include …
Five million new malware samples
In the third quarter of 2011 alone, five million new malware samples were created. In addition, Trojans set a record for becoming the preferred category for cybercriminals to …
Carbonite privacy blunder results in spam
Popular online backup service Carbonite has made another privacy misstep. Computerworld blogger Richi Jennings, a self styled “anti-spam wonk”, has discovered that …
First joint EU-US cyber security exercise
The first joint cyber security exercise between the European Union and United States is being held today in Brussels, with the support of the EU’s Network and …
Fake AV peddlers change their tactics
There has been a decline in rogue AV schemes lately, and researchers chalk it up to a combination of law enforcement and security community efforts and an increased coverage …
Managing firewall risks in the cloud
67 percent of IT security respondents in a Ponemon Institute study, report that their organization is very vulnerable or vulnerable because cloud ports and firewalls are not …
Registry Decoder: Digital registry forensics
Registry Decoder is a free and open source tool for the acquisition, analysis, and reporting of registry contents. It comes with an online acquisition component and an offline …
Featured news
Resources
Don't miss
- MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)
- OSPS Baseline: Practical security best practices for open source software projects
- Understanding the AI Act and its compliance challenges
- The art of balancing data security with business goals
- Debunking 5 myths about network automation