ICSA Labs reveals electronic health record testing program
ICSA Labs unveiled a new certification program for electronic health record systems and has certified the first three products in two domains under the program. ICSA Labs …
Harvest geolocation user info with Creepy
Creepy is an application that allows you to gather geolocation related information about users from social networking platforms and image hosting services. The information is …
The need for data encryption in the cloud
Recent Microsoft research shows that almost two-fifths of companies will start paying for cloud services within three years. Cloud-using firms need to revisit their encryption …
European Parliament computer network breached
The computer network of the European Parliament has been targeted by a cyber attack that may or may not be linked to the attack against the European Commission and the …
BP loses laptop with personal data of 13,000 claimants
A laptop containing personal information of some 13,000 people who filed claims for compensation after last year’s big oil spill in the Gulf of Mexico has been lost, …
Lifecycle model for managing unknown vulnerabilities
Codenomicon released its Unknown Vulnerability Management (UVM) Lifecycle model, a security assurance process, which focuses on unreported vulnerabilities. The UVM model helps …
Bank of America customer and staff accounts compromised
News that some Bank of America customers from the Greater Detroit area have discovered their accounts were pilfered after their debit cards were declined has raised the …
Siemens FactoryLink multiple vulnerabilities
Multiple vulnerabilities in Siemens FactoryLink can be exploited by malicious people to disclose potentially sensitive information, cause a Denial of Service, and compromise a …
Facebook XSS flaw misused for automatic Wall posting
A currently unpatched XSS vulnerability in the mobile API version of Facebook is currently being exploited to post messages to users’ Walls, which serve as a gateway to …
Qualys partners with StopBadware
Qualys is partnering with the non-profit anti-malware organization StopBadware. The two organizations will leverage one another’s strengths to bolster the Web’s …
Global spam drops by a third as Rustock botnet is dismantled
Symantec analysis reveals that in March, prior to its takedown, the Rustock botnet had been sending as many as 13.82 billion spam emails daily, accounting for an average of …
Social media threats and targeted attacks
In the video below, Alexandru Catalin Cosoi, the Head of Online Threats Lab at BitDefender, talks about the new breed of social media threats and sophisticated targeted …
Featured news
Resources
Don't miss
- Avoiding vendor lock-in when using managed cloud security services
- The CISO’s dilemma of protecting the enterprise while driving innovation
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence