Fortinet releases three new appliances
Fortinet introduced three new members to its FortiWeb Web application firewall product family – the FortiWeb-4000C, FortiWeb-3000C FSX and FortiWeb-400C. The new product …
Zappos hacked, info of 24+ million customers may be compromised
Zappos, the shoe-and-apparel-selling division of Amazon, has been hit by cyber attackers and has had one of its servers compromised and information from it exfiltrated. The …
First sub-$50 cloud router
D-Link introduced the first sub-$50 Wi-Fi router with advanced cloud services – the new D-Link Cloud Router (DIR-605L). In addition to bringing cloud-enabled devices to …
Google Docs hosted phishing schemes abound
Google Docs is a helpful office suite and data storage service that allows users to collaborate on documents with ease but, unfortunately, it is also a very useful tool for …
San Francisco City College systems infected for over a decade
Computers and servers of the City College of San Francisco have been discovered to be infected with a myriad of computer viruses and information-stealing malware, and some of …
Week in review: Currency rounding attacks, Trustworthy Computing Initiative anniversary, and how to foil targeted attacks
Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: Most unusual laptop recovery stories From the good, the bad, and …
Reactions from the security community to the Trustworthy Computing Initiative
This week, Microsoft is celebrating 10 years of its Trustworthy Computing Initiative (TwC). One of the most well-known outcomes of Trustworthy Computing is the Microsoft …
10 years of Microsoft’s Trustworthy Computing Initiative
Ten years ago this week, during a time when security problems were threatening trust in software products, Bill Gates sent an email to all Microsoft full-time employees …
Chinese using malware to attack US DoD smart card security
AlienVault found evidence of Chinese-originated attacks against the US government agencies including the US Department of Defense (DoD), which use a new strain of the Sykipot …
Volume and sophistication of attacks to increase
Based on activity levels observed in the second half of 2011, the growing pace, volume and sophistication of attacks suggest consumers, small businesses and corporations will …
Identity intelligence and the complexity of security
An employee’s unauthorized access to client information can leave a firm vulnerable to security breaches and audits. Many companies juggle the administration of …
Secure web gateway protection from Sophos
Virtualization has helped organizations reduce capital and operating costs, while driving greater levels of application availability. It has also yielded benefits in …
Featured news
Resources
Don't miss
- Cryptomixer crypto laundering service taken down by law enforcement
- Treating MCP like an API creates security blind spots
- Offensive cyber power is spreading fast and changing global security
- Enterprise password audits made practical for busy security teams
- What zero trust looks like when you build it step by step