Multiple vulnerabilities in Symantec products
Multiple vulnerabilities have been reported in Symantec products, which can be exploited by malicious people to cause a Denial of Service and compromise a vulnerable system, …
API bug responsible for Zuckerberg page hack
When at first Facebook didn’t issue a statement about what really happened on Mark Zuckerberg’s fan page and how someone managed to post a message in his name …
Worrying increase in surveillance across Europe
A landmark EU-wide study of national privacy safeguards shows a decline in privacy protection across Europe and a steep increase in state surveillance over the lives of …
A step towards wider SSL implementation
Two great stumbling blocks on the path leading to a Web-wide implementation of the SSL/TLS protocols have always been cost and speed. So far, the great majority of websites …
An increase in form-based e-mail phishing attacks
Luring people in with the promise of hefty tax refunds and “stimulus payments”, phishers have been targeting users with e-mails purportedly coming from HM Revenue …
Facebook adds secure browsing and social authentication
The “social CAPTCHA” method of authentication that Facebook developed to prevent the Tunisian government to access the accounts of the people whose login …
LogLogic Compliance Manager 2.0 released
LogLogic released Compliance Manager 2.0 which provides users with an executive view into an enterprise’s compliance posture and reduces the time and costs required to …
New storage system for field forensic investigators
Guidance Software announced a new compact, easily transportable storage system that gives forensic investigators the storage capacity they need to handle large cases in the …
Cisco to acquire Pari Networks
Cisco announced its intent to acquire privately-held Pari Networks, a provider of network configuration and change management (NCCM) and compliance management solutions that …
Protesters organize via social networks, governments move to block them
The wave of nation-wide protests that ended in the Tunisian president Ben Ali’s run to Saudi Arabia was at least in part made possible by the organizers’ use of …
Conficker: Lessons learnt
The Conficker worm is the largest computer worm infection with more than seven million government, business and home computers in over 200 countries now under its control. In …
Mark Zuckerberg’s Facebook page hacked
An unknown hacker broke into the 26-year-old internet celebrity’s Facebook account and posted a bizarre message calling upon the firm to adopt a social cause: “Let …
Featured news
Resources
Don't miss
- Man vs. machine: Striking the perfect balance in threat intelligence
- Misconfig Mapper: Open-source tool to uncover security misconfigurations
- Why AI deployment requires a new level of governance
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests