Data Breach and Encryption Handbook
Cybersecurity risks pose some of the most serious economic and national security challenges of the 21st century. A new book, Data Breach and Encryption Handbook, published by …
HBGary breach revelations and repercussions
A few days ago, the Internet group Anonymous downed security firm HBGary’s website and breached its networks, downloading a serious amount of confidential information …
Multiple vulnerabilities in Django
Vulnerabilities have been reported in Django, which can be exploited by malicious people to bypass certain security restrictions and conduct script insertion and cross-site …
Credit score checking app triggers Trojan download
The main reason people get scammed and/or their computer infected online is because they can’t contain their curiosity, and that is precisely the thing on which the …
iPhones and iPads reveal passwords regardless of passcode protection
Losing your iPhone or iPad equals having your passwords compromised – even if the device is protected with a passcode. The results of an experiment conducted by Jens …
Van Gogh Museum fan page hit by Facebook scammers
The Facebook page for the Van Gogh Museum in Amsterdam has been targeted by scammers. Messages were posted on the compromised page, including links to a version of the …
IBM secures mobile and instrumented devices
IBM announced new initiatives to extend security to the growing number of mobile and instrumented devices beyond an organization’s own four walls, such as smartphones, …
400,000 e-mail addresses stolen in Irish job website breach
Names and e-mail addresses of some 400,000 job seekers have been harvested by hackers who have breached the RecruitIreland.com site and its systems. The site has been taken …
Security service for Android and Symbian
The new version of F-Secure’s Protection Service for Mobile (PSM 7) enables operators to offer protection and parental control for their customers’ mobile devices. …
7 critical questions to ask before developing a social media policy
Social media disrupts the long-standing rules of business in many ways, but crafting a social media policy is premature unless the designers of the policy answer seven …
Immunet 3.0 introduces custom anti-malware signatures
Sourcefire released Immunet 3.0 which enables users to create custom anti-malware signatures for more accurate protection against targeted attacks and offers a Cloud Recall …
Network situational awareness and retro analysis
Trisul is a Linux based application that passively listens to network traffic and tracks a number of traffic metrics across all layers. It correlates these traffic metrics …
Featured news
Sponsored
Don't miss
- Roundcube flaws allow easy email account compromise (CVE-2024-42009, CVE-2024-42008)
- OpenWrt dominates, but vulnerabilities persist in OT/IoT router firmware
- Sports venues must vet their vendors to maintain security
- RustScan: Open-source port scanner
- Breaking down FCC’s proposal to strengthen BGP security