Anonymous won’t publish stolen NATO documents
Following the arrest of 16 individuals in the U.S. and five in the U.K. and the Netherlands who are allegedly connected to the various cyber attacks organized by Anonymous, …
Hacking a mature security program
Most organizations are used to standard penetration tests. However, companies that have been increasing their overall security posture proactively through years of program …
New French eID card to tackle identity theft
Identity theft is a growing issue in many countries with 80,000 cases per year in France alone, according to the French Interior Ministry. For this reason the French National …
New book: Mac OS X Lion Pocket Guide
The Mac OS X Lion Pocket Guide is packed with concise and useful information in an easy-to-read format for users of all levels. It’s ideal for quick problem solving, and …
Cybersecurity risk management application for industrial control systems
Citicus has launched Citicus ICS, a new application to manage industrial process control risk. This enables organizations to identify and manage risks to SCADA and other …
Combat wire transfer fraud
The spread of internet malware and key logging software has led to an increase in sophisticated wire fraud schemes targeting customers of community financial institutions. In …
Apple Safari 5.1 increases security
Safari 5.1 includes improvements to performance, stability, and security. CFNetwork In certain situations, Safari may treat a file as HTML, even if it is served with the …
Deep Freeze Mac 5.0 released
Faronics released the newest version of its system-restore software, Deep Freeze Mac 5.0, to coincide with the launch of Mac OS X Lion. Deep Freeze Mac removes any …
Enhanced phishing methods on the rise
There’s been an increase in targeted and combined email-based threats, a new twist in phishing attacks, and an escalation in social engineering scams through popular …
Joomla 1.7.0 security release
Joomla 1.7.0. This is a security release. This is also the first release made within the new six-month release cycle that started with the delivery of Joomla 1.6 in January …
Guide for the Secure Software Development Lifecycle
(ISC)2 released of the “Official (ISC)2 Guide to the CSSLP“, a textbook that serves as the only official guide to the Certified Secure Software Lifecycle …
Mikko Hypponen: Fighting viruses, defending the net
It’s been 25 years since the first PC virus (Brain A) hit the net, and what was once an annoyance has become a sophisticated tool for crime and espionage. Computer …
Featured news
Resources
Don't miss
- Why we must go beyond tooling and CVEs to illuminate security blind spots
- Making security and development co-owners of DevSecOps
- Review: Passwork 7.0, self-hosted password manager for business
- What a mature OT security program looks like in practice
- Machine unlearning gets a practical privacy upgrade