Cisco to acquire newScale
Cisco today announced its intent to acquire privately-held newScale, a provider of software that delivers a service catalog and self-service portal for IT organizations to …
McAfee.com filled with vulnerabilities
Discovering that your site is chock full of security vulnerabilities must be embarrassing for any company, but is surely doubly so when you are a company offering to secure …
Lawyers appeal Twitter data handover decision in WikiLeaks case
Not satisfied with the court’s decision that it has to turn over account details of three of its users to the US Department of Justice, three Twitter users have filed a …
The most challenging compliance regulation? HIPAA
From an IT standpoint, the Health Insurance Portability and Accountability Act (HIPAA) is the most challenging regulation to businesses today, according to Ipswitch. HIPAA, …
VPN client suite for Mac OS X
NCP engineering released its centrally managed IPsec VPN client for Mac OS X 10.5 (Intel) and 10.6. Mobile employees using Mac OS X are now able to access the company network …
New ransomware variant in the wild
A new variant of a piece of ransomware seen in the wild late last year has begun targeting users that made the mistake of landing on the site that serves it via drive by …
MySQL.com compromised by SQL injection attack
MySQL.com has been hacked and a part of the database containing member and employee email addresses, usernames and passwords has been published by the hackers on Pastebin.com. …
Lone hacker owns the Comodo certificate compromise
Last week’s revelation that a Comodo affiliate Registration Authority has been compromised and that nine rogue SSL certificates have been issued for popular domains such …
Spotify has been displaying malicious ads
Streaming music service Spotify has been displaying malicious ads to users of their Free version. The ads lead to websites that used the Blackhole Exploit Kit to infect users …
Intellectual capital is the new cybercrime currency
Cybercriminals understand there is greater value in selling a corporations’ proprietary information and trade secrets which have little to no protection making …
Protect the privacy of your Android phone
Privacy Blocker is an Android application that stops other installed applications from gathering your personal information. The software basically pinpoints the type of data …
Most organizations can’t access critical security data
Many enterprises feel that their security processes are failing to meet their potential due to a lack of coordination, benchmarking, and proactive improvement among the …
Featured news
Resources
Don't miss
- Avoiding vendor lock-in when using managed cloud security services
- The CISO’s dilemma of protecting the enterprise while driving innovation
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence