Key issues facing SaaS industry
More than 95 percent of organizations expect to maintain or increase their investments in software as a service (SaaS) and more than one-third have migration projects under …
Symantec IM Manager multiple vulnerabilities
Multiple vulnerabilities have been reported in Symantec IM Manager, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to …
Week in review: Mysql.com hack, QR codes leading to malware and Facebook fixes post-logout tracking cookie
Here’s an overview of some of last week’s most interesting news, interviews, podcasts and articles: Facebook changes raise serious security concerns The last few …
QR codes used to infect Android users with malware
Most people already know what QR codes are: a new type of “barcode” that can be used for a variety of purposes – tracking, ticketing, labeling of products, …
Microsoft security solutions say Chrome is malware
Among the questions and comments on the Google Chrome support forums this morning are several complaints about Microsoft Security Essentials detecting Chrome as a Zbot variant …
XenServer 6 released
Citrix Systems released XenServer 6. As a key component of the Citrix cloud computing and virtualisation strategy, XenServer 6 brings new optimizations and improved …
Nearly 5 million military health care files stolen
Sensitive data about nearly 5 million patients has been compromised following the theft of backup tapes from an electronic healthcare app used in the military health system, …
Critical vulnerabilities triple in 2011
Adoption of mobile devices such as smartphones and tablets in the enterprise, including the “Bring Your Own Device” approach, which allows personal devices to …
Smartphone users choose convenience over security
In a revealing survey of smartphone and tablet users, the majority polled admit to not password protecting their mobile devices despite keeping them logged in to sensitive …
Content protection for Android devices
Elliptic Technologies expanded its DTCP-IP content protection offering to include support for Android used in a myriad of consumer devices, including DLNA enabled smartphones …
Mail-borne polymorphic malware soars
Approximately 72% of all email-borne malware in September could be characterized as aggressive strains of generic polymorphic malware, says Symantec in its September 2011 …
25% of tested Google Chrome extensions allow data theft
27 of a 100 tested Google Chrome extensions have been found vulnerable to data (passwords, history, etc.) extraction attacks though specially crafted malicious websites or by …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground