Fake AV spreading via Yahoo! Answers
From poisoned Google image search results to poisoned answers to legitimate questions on Q&A sites like Yahoo! Answers and public forums, malware peddlers are determined …
41% carry unprotected sensitive information on mobile devices
41 percent of what should be a security savvy audience are carrying sensitive information on mobile devices unprotected, according to Origin Storage. In fact, 19 percent …
Google Chrome sandbox apparently cracked
French security firm VUPEN has announced that its researchers have managed manufacture an exploit able to bypass Google Chrome’s sandbox, ASLR and DEP. It is precisely …
Cyber criminals moving operations to Canada
Cyber criminals are on the move again and, this time, Canada is the prime target. IP addresses in China and Eastern Europe are highly scrutinized and undergoing intense …
Free browser-based security assessment
Shavlik Technologies announced a new browser-based security advisory that helps identify potential security vulnerabilities on a network. Shavlik Security Advisor scans all …
Cloud-based protection for virtualized environments
Panda Security launchd Panda Virtual GateDefender Performa which delivers cloud-based protection for VMWare virtualized environments. Companies can now protect their perimeter …
Compliance is more than just cost
Compliance investments, which are basically treated only as a spending to align with compulsory regulations, when extended to all processes including privileged and super …
Sony suffers third breach, PSN still down
Sony’s troubles seem to have no end as the company confirms a third breach of their network and fails to set a date for the restoration of services. This last breach …
“Time spent on Twitter” scam spreads virally
Facebook users are already accustomed to practically daily offers of rogue apps that will supposedly show them who views their profile or allow them to use a similar feature …
Files uploaded to file hosting services accessed by malicious individuals
File hosting services such as RapidShare, FileFactory, Easyshare and others have a number of flaws that make it possible for unauthorized people to access and download files …
Xerox and Cisco partner to deliver cloud services
Xerox and Cisco intend to form an alliance to simplify IT management by delivering cloud-based services and technology solutions that combine network intelligence and print. …
Skype for Mac message processing code execution vulnerability
Pure Hacking, a group of ethical hackers in Australia, reported directly to Skype what they believed to be a zero-day vulnerability in Skype for Mac 5.x The vulnerability in …
Featured news
Resources
Don't miss
- Avoiding vendor lock-in when using managed cloud security services
- The CISO’s dilemma of protecting the enterprise while driving innovation
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence