Flame abused Windows Update to spread
You have probably already heard that Microsoft released an out-of-band update that revokes three rogue certificates that were used to sign a couple of modules of the recently …
Win8’s AV will kick in after other solutions stop working
Last week, McAfee shared the findings of a year-long project that revealed that some 17 percent of all the tested PCs around the globe had either no AV software installed or …
Apple publishes iOS security guide
Apple has a reputation for being extremely reticent when it comes to discussing security in public – so much so that most of the security features their devices sport …
UGNazi attack 4chan, CloudFlare
Visitors to 4chan have recently been automatically redirected to the Twitter account of hacker group UGNazi, and an investigation into the matter revealed that the attack has …
Real-time mobile vulnerability management
Mobilisafe launched its cloud-based Mobile Risk Management (MRM) solution, enabling IT to identify and eliminate the significant risks associated with the …
Over-55s pick stronger passwords than youngsters
Despite the often repeated recommendations by security experts, most users regularly fail to choose strong enough passwords. Joseph Bonneau, a computer scientist and …
Consumers confused about data breaches
A business’s ability to protect personal information and communicate the circumstances of a data breach can impact customer loyalty and an organization’s …
Some Flame modules were signed with rogue Microsoft certificates
While investigating the recently unearthed Flame (SkyWiper) toolkit, Microsoft’s researchers have made an unwelcome discovery. “We have discovered through our …
Siemens enhances security of industrial networks
Siemens announced new versions of its Simatic NET CP 343-1 Advanced and Simatic NET CP 443-1 components with integrated security functions to enable companies to enhance the …
iOS app creates different personas on social networks
Have you ever decided not to post an update because you didn’t want your entire social network to be privy to every intimate detail of your life? Of course you have. …
Information Storage and Management
Information Storage and Management covers the components of a storage system and the different storage system models while also offering essential new material that explores …
Week in review: New cyber weapon Flame, gamers under attack, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, podcasts, videos, interviews and articles: Privacy trends affecting security In this podcast …
Featured news
Resources
Don't miss
- Treating MCP like an API creates security blind spots
- Offensive cyber power is spreading fast and changing global security
- Enterprise password audits made practical for busy security teams
- What zero trust looks like when you build it step by step
- Social data puts user passwords at risk in unexpected ways