How to build a trusted virtualized platform
Trusted Computing Group (TCG) released the first Virtualized Platform Architecture, which describes how to build a trusted virtualized platform. With this specification, …
ICSA Labs launches network IPS testing program
ICSA Labs is launching a quarterly testing program for network intrusion prevention systems. The quarterly testing, which is available to all IPS manufacturers, is also an …
Veracode enhances its application risk management platform
Veracode, announced enhancements to its cloud-based application risk management platform that make it even easier to embed security verification processes into the software …
OpenStack Diablo to power global clouds
OpenStack, the open source cloud operating system, released Diablo, the fourth version of its community-driven software. OpenStack Diablo allows users to automate and control …
Tips for safe online shopping
Avira recommends that consumers watch for a few things in order to not become a victim of the online fraudsters: 1. Always check that the connection to the online store where …
FortiNet FortiAnalyzer XSS and script insertion vulnerabilities
Two vulnerabilities have been reported in FortiNet FortiAnalyzer, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to …
Is China behind the Japanese defense contractor hack?
Anonymous sources “in the know” regarding the investigation of the Mitsubishi Heavy Industries breach have hinted at the possibility that the attackers are …
Fake Diablo beta invites hitting inboxes
Since the third installment of the popular Diablo game franchise has been announced in 2008, fans all over the world have been impatiently waiting for it to become available. …
Fake stores dominant threat due to blackhat SEO
“Searches for buying software online remains 90 percent malicious, redirecting users to fake stores,” concluded Julian Sobrier recently, after having analyzed the …
Security guidelines for PKI-based transactions
For all the infrastructure advantages and business benefits of PKI, recent breaches clearly indicate that the way in which PKI is implemented may not be as inherently secure …
Cisco reveals the importance of networks in daily life
Demonstrating the increasing role of the network in people’s lives, an international workforce study by Cisco revealed that one in three college students and young …
(IN)SECURE Magazine issue 31 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 31 has been released today. Table of contents: The …
Featured news
Resources
Don't miss
- Superagent: Open-source framework for guardrails around agentic AI
- Security chaos engineering matters when nothing is broken
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity