No skeleton key: Protecting your organization on the web
Weaknesses in the SSL protocol or the public certificate authority ecosystem that underpin it have received a lot of coverage recently and the last couple of weeks have been …
Password amnesia and online identity
The use of multiple passwords is posing a security risk to individuals and businesses alike, according to Ping Identity. A new study, which surveyed 2,000 consumers, …
NAC system PacketFence 3.2.0 released
PacketFence is a fully supported, trusted, free and open source network access control (NAC) system. This is a major release with new features, new hardware support, …
Application security intelligence combats mobile threats
Cenzic introduced a new application security intelligence service that secures mobile applications on all mobile platforms, via the cloud. The new solution scans and provides …
Pastry lovers served with ransomware via exploit kit
French cake and pastry lovers have been targeted by cyber crooks as the website of the famous confectionery company Laduree has been compromised and found serving ransomware. …
FCC offers advice to ISPs for boosting network security
The Chairman of the Federal Communications Commission, an independent agency of the US government whose goals include public safety, says that Internet service providers …
Identity fraud hits 11.6 million in the US
In 2011 identity fraud increased by 13 percent. More than 11.6 million adults became a victim of identity fraud in the United States, while the dollar amount stolen held …
New capabilities for the IBM security intelligence platform
IBM unveiled new capabilities planned for its security intelligence platform designed to combine deep analytics with real-time data feeds from hundreds of different sources to …
Facebook scams racing against the clock
Facebook scammers have lately initiated a number of scams that use an unusual approach to make users “like” 70+ Facebook pages without even knowing what they are. …
Six principles for effective cloud computing
The growing shift to cloud computing can deliver significant value—but most enterprises have little knowledge of the perils of transferring IT decision making away from …
Juniper Networks acquires Mykonos Software
Juniper Networks has acquired Mykonos Software, a provider of Intrusion Deception Systems that protect websites and web applications. Under the terms of the agreement, Juniper …
Metasploit identifies IPv6 security risks
Rapid7 announced that the new version of Metasploit 4.2 allows users to fully test whether IPv6 addresses on their network are vulnerable to cyber attacks. This is …
Featured news
Resources
Don't miss
- Webinar: Beyond the Quadrant: An Analyst’s Guide to Evaluating Email Security in 2026
- CISO Assistant: Open-source cybersecurity management and GRC
- Firmware scanning time, cost, and where teams run EMBA
- How AI image tools can be tricked into making political propaganda
- Product showcase: Orbot – Tor VPN for iOS