Microsoft provides protection for ASP.NET vulnerability
Microsoft published Security Advisory 2659883 to provide a workaround to help protect ASP.NET customers from a publicly disclosed vulnerability that affects various Web …
Emerging threats to become major players in 2012
Emerging threats from 2011 are on track to become the major players for cyberactivity in 2012, including mobile banking, “legal” spam and virtual currency. McAfee …
Mac management tools from Google
Google’s internal Macintosh Operations team is starting to release the utilities, tools, and scripts for managing and tracking a fleet of Macintoshes in a corporate …
Pentagon officials allowed to use Android
US Department of Defense officials that need a mobile device are no longer restricted to using a BlackBerry, reports Muktware. The Pentagon has now also allowed the use of …
Anonymous targets security think tank, pilfers sensitive data
The hacking collective Anonymous has downed the website and stolen client information belonging to Stratfor (Strategic Forecasting Inc.), a US-based research group that …
Data-stealing malware growth spikes
The propagation of some forms of crimeware surged in the half-year period ending in June, 2011 with data-stealing malware reaching and maintaining a new plateau of contagion, …
What’s in store for us in 2012
Looking forward into what lies ahead for us in 2012, Zscaler offers predictions for the upcoming threat landscape. 1. Mobile: With WebOS now officially an orphan, Blackberry …
NAC system PacketFence 3.1.0 released
PacketFence is a fully supported, trusted, free and open source network access control (NAC) system. Boasting a feature set including a captive-portal for registration and …
Week in review: Mobile application security risks, holiday-themed scams, and reasons for ditching Java
Here’s an overview of some of last week’s most interesting news and podcasts: Windows 8 will have picture password sign in As much as security experts would like …
Ditching Java might be a good move
As unpatched Java vulnerabilities are frequently taken advantage by exploit kits and users often forget to update Java, F-Secure’s Mikko Hypponen says that maybe …
Researcher blasts Siemens for lying about SIMATIC bugs
The contentious issue of responsible and coordinated vulnerability disclosure has been revisited again as security researcher Billy Rios reacted to a statement made by Siemens …
Compliance data service from software piracy experts
To accelerate the identification of companies using unlicensed software, V.i. Labs announced a data service to automatically match license infringement records to a named …
Featured news
Resources
Don't miss
- LLMs are automating the human part of romance scams
- Superagent: Open-source framework for guardrails around agentic AI
- Security chaos engineering matters when nothing is broken
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible