Hijacked phishing page warns users about phishing
hen you follow security news daily like I do, it is tough to keep a positive outlook when day after day you hear and read of users falling for basically the same scams simply …
Ten early warning signs of fraud
Anti-fraud consultancy UK Fraud published a list of ten common early warning signs which could alert management that fraud may be occurring in their organization. The list …
Analyze the virtual environment with vScope Explorer
vScope Explorer is a free tool that assesses the performance health of all VMs in an environment, across data centers and from multiple vCenter servers, displaying any …
SANS virtualization security course returns to London
The SANS Institute has added Security 577 Virtualization Security Fundamentals to the line-up for SANS 2011 London following popular demand. On its European début last year, …
Explore what ISO 27001 documentation looks like
Documentation is the core of your ISO 27001 implementation. A good set of documents will enable your employees to understand their obligations better while poorly written …
Free web service identifies Internet abuse
Zscaler released IPAbuseCheck, free web service which will allow them to query a dynamic ThreatLabZ database to identify whether any of their endpoint clients and IP addresses …
Customizable cloud service with hybrid options
Contegix announced an expansion to MiraCloud, its cloud computing platform. It will offer a tiered cloud hosting model that includes convenience class, business class and …
Security testing to become part of education in Germany
Codenomicon and Brandenburg University of Applied Sciences (FH Brandenburg) announced a cooperation agreement to help educate German IT professionals. Codenomicon’s …
Security for virtualized environments
Bitdefender announced the commercial availability of an integrated security solution for VMware vShield 5 virtualised datacenters. Security for Virtualized Environments …
Federal Trojan has more capabilities than previously thought
Ten days ago, the Chaos Computer Club made public a set of worrisome discoveries made by their analysis of the “lawful interception” Trojan used by German law …
Mac Trojan disrupts automatic updating of XProtect
A variant of the recently discovered Flashback Trojan for Mac OS X has acquired the capability to disrupt the automatic updating of XProtect, the operating system’s …
U.S. DHS expects Anonymous to attack infrastructure
Anonymous is eyeing industrial control systems for future attacks, says the U.S. Department of Homeland Security, but its members have yet to demonstrate a capability to …
Featured news
Resources
Don't miss
- What 35 years of privacy law say about the state of data protection
- 40 open-source tools redefining how security teams secure the stack
- Password habits are changing, and the data shows how far we’ve come
- Product showcase: Tuta – secure, encrypted, private email
- Henkel CISO on the messy truth of monitoring factories built across decades