Can employers demand access to your Facebook account?
Most people consider their Facebook profile and its contents private and sacrosanct, but sometimes companies don’t agree with this assessment. The latest instance of …
Ambitious malware variant signed with fake digital signature
New Zeus variants and spam campaigns that try to spread them far and wide are almost a daily occurrence, but once in a while some get more attention by security researchers …
New types of cookies raise online privacy concerns
The advertising industry has led the drive for new, persistent and powerful cookies, with privacy-invasive features for marketing practices and profiling. The EU cyber …
Week in review: Facebook phishing, Stuxnet revelations and lessons from HBGary breach
Here’s an overview of some of last week’s most interesting news, videos and articles: Virus downs Australian ambulance dispatch service The infection spread …
Virtualization platform for multiple OSes and apps
As a new participant to the RSA Conference, LynuxWorks demonstrated its LynxSecure high-performance, secure virtualization platform. The LynuxWorks platform allows multiple …
Photos: RSA Conference 2011 Expo, part 2
The expo floor is teeming with knowledge, solutions and possibilities: The Secunia booth. Splunk demoing their product. The Cenzic booth. The Motorola AirDefense booth. Ivan …
One-time password authentication for MS DirectAccess
Gemalto announced that its Strong Authentication Server and Protiva OTP Tokens have been integrated with Microsoft DirectAccess. The Protiva OTP token adds another layer of …
Facebook users targeted by unimaginative phishing campaign
A phishing campaign targeting Facebook users is currently under way and lures users with messages coming from compromised accounts seemingly containing links to various …
Information security pros stretched thin and overworked
A study based on a survey of more than 10,000 information security professionals worldwide finds that a growing number of technologies being widely adopted by businesses are …
Managed file transfer with large enterprise clustering
Axway introduced large enterprise clustering for its SecureTransport offering. SecureTransport simplifies and secures file transfers between people, sites, applications and …
Distributed security architecture for security enforcement
The new borderless organizations have dramatically changed the definition of how, when and where people work, causing a need to redefine the way security solutions are built …
Comprehensive vulnerability, configuration, OS and app auditing
nCircle announced that its solutions now audit for over 40,000 conditions including vulnerabilities, configurations, operating systems and applications. The company also …
Featured news
Sponsored
Don't miss
- Roundcube flaws allow easy email account compromise (CVE-2024-42009, CVE-2024-42008)
- OpenWrt dominates, but vulnerabilities persist in OT/IoT router firmware
- Sports venues must vet their vendors to maintain security
- RustScan: Open-source port scanner
- Breaking down FCC’s proposal to strengthen BGP security