Most sites are exposed to at least one vulnerability each day
The average website has serious vulnerabilities more than nine months of the year and data leakage has over taken cross site scripting as the most common website …
Pwn2Own: Safari and IE8 go down, Chrome’s attacker a no-show
The results of the first day of the Pwn2Own contest held each year at the CanSecWest conference are the following: Safari and IE8 went down, Chrome is still unscathed due to a …
GFI MAX MailArchive released
GFI Software launched GFI MAX MailArchive, a hosted service which allows businesses to archive email messages to geographically distributed datacenters for future search, …
Free, open source exploit kit offered online
Among the various exploit kits for sale out there it seems there is one that aspiring cyber crooks can use for free. Researchers from M86 have stumbled upon it by chance, and …
Cloud streamlines efficiency of identity theft
Working with cloud-based services significantly improves economies of scale – for cybercriminals too, according to Commtouch. Phishers are already benefiting from free …
Tips for healthcare organizations to improve their security profile
Based upon extensive work in both healthcare IT and information security, CDW Healthcare has identified preliminary steps for healthcare organizations focused on improving …
SANS gets ready for Amsterdam
SANS Secure Europe, one of the region’s largest infosec training events is returning to Amsterdam’s Radisson Blu Hotel from 9th-21st May with 2 weeks of technical, …
Apple iOS 4.3 fixes security issues
The iOS 4.3 update contains new features, improvements, security and bug fixes. CoreGraphics Multiple vulnerabilities existed in FreeType, the most serious of which may lead …
Restrictive e-mail policies: Hidden security risks for business
IT departments are fighting a losing battle in seeking to constrain employees’ behavior through policy alone, according to Mimecast. Findings suggest that a new approach …
March Patch Tuesday details
In the video below, Qualys CTO Wolfgang Kandek and Qualys vulnerability labs manager Amol Sarwate discusses this month’s Microsoft Patch Tuesday release.
How can the author of an anonymous e-mail be identified?
When anonymous letters were written by hand, graphologists were called in to identify the likely author. In this day and age when most such mail is sent electronically, it may …
Multiple vulnerabilities in Google Chrome
Multiple vulnerabilities have been reported in Google Chorme, according to Secunia. Some have an unknown impact while others can be exploited by malicious people bypass …
Featured news
Resources
Don't miss
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence
- Misconfig Mapper: Open-source tool to uncover security misconfigurations
- Why AI deployment requires a new level of governance