Microsoft takes down Kelihos botnet
After having disrupted the operation of the Waledac and Rustock botnets, Microsoft has set its sights on a smaller one that is thought to be an attempt to rebuild the Waledac …
10 actions to reduce IT infrastructure and operations costs
As many IT organizations are under intense pressure to continue to implement cost-cutting initiatives, Gartner has identified 10 actions that can reduce IT infrastructure and …
Multi-year study of real-world software security initiatives
The third major release of the “Building Security In Maturity Model” (BSIMM) study continues to add real-world data defining benchmarks for successfully developing …
IP Address Management platform Proteus 3.7 released
BlueCat Networks announced the latest release of Proteus, a scalable IP Address Management (IPAM) platform. Proteus 3.7 delivers enhanced usability, scalability, seamless …
Facebook allegedly promises to fix logout cookies issue
The Facebook tracking cookies issue revealed yesterday has, expectedly, created quite a stir in the security community. The company went into damage control mode and repeated …
Avoid mobile device geolocation risks
Twenty-eight percent of U.S. adults use location-based applications like Facebook and Google Maps, and that number will grow, according to ISACA. Regulating geolocation data …
Alureon extracts backup C&C locations embedded in images
An Alureon Trojan variant designed to extract the location of backup C&C centers from images disseminated across the Web has been discovered by a Microsoft researcher. …
McAfee All Access secures all Internet connected devices
A week after the Kaspersky One announcement, McAfee announced the availability of cross-device security solution that protects Internet-connected devices. McAfee All Access is …
Browser companies react to BEAST attack
As Juliano Rizzo and Thai Duong have demonstrated on Friday, the SSL/TLS encryption used by the great majority of websites has been cracked. Their BEAST (Browser Exploit …
US DHS asks public to share ideas on botnet mitigation
The U.S. Department of Homeland Security and the U.S. Department of Commerce have issued a public call for comments from “all Internet stakeholders” in order to …
CSA issues first Security as a Service white paper
The Cloud Security Alliance (CSA) announced that the Security as a Service working group has published its first white paper, “Defined Categories of Service 2011”. …
Enhanced enterprise mobility management platform
BoxTone announced an advancement to its EMM platform, delivering the first fully automated policy and compliance management engine with a real-time mobile security dashboard, …
Featured news
Resources
Don't miss
- What 35 years of privacy law say about the state of data protection
- 40 open-source tools redefining how security teams secure the stack
- Password habits are changing, and the data shows how far we’ve come
- Product showcase: Tuta – secure, encrypted, private email
- Henkel CISO on the messy truth of monitoring factories built across decades