78% of organizations experienced downtime due to mismanaged encryption
Encryption key and digital certificate inventories are rising, according to a study by Venafi. Poorly managed encryption leads to system downtime, non-compliance and audit …
Adobe to release more secure PDF reader
Adobe is announcing the new Acrobat X Family of Products which includes Adobe Reader X as well as Acrobat X Suite, Acrobat X Pro, and Acrobat X Standard. Reader X is the only …
Fraud losses increase by 20% in the past 12 months
Theft of information and electronic data at global companies has overtaken physical theft for the first time, according to the Kroll Annual Global Fraud Report. The study …
A cyber criminal’s key to vulnerable systems
New, advanced evasion techniques (AET) that can pose a serious threat to existing network security systems worldwide, according to Stonesoft. These AET threats significantly …
ZeuS gang using malicious LinkedIn spam targets Charles Schwab accounts
The recently started LinkedIn spamming campaign that delivers the ZeuS Trojan – or, according to some, the Bugat Trojan – has been tied to a gang that uses the …
Week in review: Cloud security, patching challenges and RSA Conference 2010 news
Week in review: Here’s an overview of some of last week’s most interesting news, interviews, articles, reviews and podcasts: A foolproof drive-by-download blocking …
Government agents following suspects on social networks
The issue of whether or not government or law enforcement agents are or should be allowed to go “undercover” on social networks is not a new one, but thanks to the …
ZeuS developers up the ante with beefed up variant
ZeuS has for a while now been almost a synonym for banking Trojans of every shape and form. Some say that the attention that the information security community has focused on …
BlackBerry patches Enterprise Server
A vulnerability in the BlackBerry Attachment Service component of the BlackBerry Enterprise Server could allow a malicious individual to cause buffer overflow errors, leading …
5 tips for protecting against spam attacks
Whether you’re at work or at home, spam causes headaches and wastes time, forcing you to trawl through your inbox to work out which mail is legitimate and which is spam. …
One in five spam messages comes from the U.S.
Sophos published the latest report into the ‘Dirty Dozen’ spam-relaying countries, covering the third quarter of 2010. Since the second quarter this year, the spam …
Android SMS Trojan variant targets Russian users
It worked for the first two times, why wouldn’t it a for third? It’s likely that the same scammers who were behind the previously discovered Android Trojan …
Featured news
Sponsored
Don't miss
- ITSM concerns when integrating new AI services
- Scaling data security solutions: What you need to know
- Whitepaper: Tools to tackle the multicloud environment
- Critical Apache OFBiz pre-auth RCE flaw fixed, update ASAP! (CVE-2024-38856)
- Chinese hackers compromised an ISP to deliver malicious software updates