Lack of security measures still hinder cloud computing adoption
Demand for cloud computing systems clearly exists. However, better security, like multi-factor authentication and encryption, are going to be required if cloud computing …
Network access control system PacketFence 1.9.1 released
PacketFence is a free and open source network access control (NAC) system. It can be used to effectively secure networks – from small to very large heterogeneous …
Microsoft offers free AV to small businesses
In a well-calculated but also very positive move, Microsoft has announced that – beginning in early October – it will be offering its Microsoft Security Essentials …
No sexually explicit content in the office, please!
Symantec announced the publication of its September 2010 MessageLabs Intelligence Report, and the analysis reveals that 35 percent of remote and office-based workers who use …
All-in-one Wi-Fi cracking solution
ElcomSoft upgraded its Wireless Security Auditor and made it an all-in-one wireless cracking solution. It can automatically locate wireless networks, intercept data packets, …
The cookie that won’t go away
A proof-of-concept JavaScript API that manufactures persistent cookies and stores them in several types of storage mechanisms has been developed by security hacker Samy …
Software security testing – interest is high, security is low
In the past six months alone there have been multiple new zero-day vulnerabilities reported in Microsoft Windows and widely covered uneasiness about the security of mobile …
Theories about Stuxnet’s goal and authors abound
The quality of its code, the stolen certificates used to digitally sign it, the specifically targeted configuration, the four 0-day Windows vulnerabilities it exploits to …
Breakdown of security weaknesses by industry and organization size
WhiteHat Security released the tenth installment of its Security Website Security Statistics Report, providing a first-time breakdown of the state of website security by …
Trojan stealing private key certificates
As you may have already noticed, malware peddlers have realized that their wares have a greater chance of being loaded by the targeted system if they are digitally signed. The …
Cybersecurity tips for the enterprise
With the recent rise in malvertising, high-impact data breaches and other malicious security threats, the practices and secure infrastructure of legitimate marketers …
New software improves ability to detect malware in cloud-computing systems
Researchers from North Carolina State University have developed new software that offers significantly enhanced security for cloud-computing systems. The software is much …
Featured news
Sponsored
Don't miss
- Critical Apache OFBiz pre-auth RCE flaw fixed, update ASAP! (CVE-2024-38856)
- Chinese hackers compromised an ISP to deliver malicious software updates
- The role of AI in cybersecurity operations
- How to start your cybersecurity career: Expert tips and guidance
- MISP: Open-source threat intelligence and sharing platform