Please turn on your JavaScript for this page to function normally.
QualysGuard integration with BeyondTrust PowerBroker

BeyondTrust and Qualys announced a technology partnership to integrate QualysGuard with BeyondTrust’s PowerBroker for Unix Servers. The integration will enable customers …

Microsoft confirms unpatched Windows vulnerability

Microsoft released a new security advisory to address a publicly disclosed vulnerability affecting Microsoft Windows’ Graphics Rendering Engine on Windows Vista, Server …

The evolution of cyber criminal operations

There is a concerning evolutionary step cyber criminal operations are taking to more effectively diversify the distribution of their ill-gotten gains, according to Fortinet. …

Is Google losing its fight against spam?

Once upon a time, Google was unequivocally the best and the most popular search engine in the world. Ranking pages by how they were interconnected (linked) to other sites, …

Most federal employees take IT security seriously

Most Federal employees go beyond baseline IT security requirements, according to a new survey by the Government Business Council. While 97 percent of Federal employees are …

Dell to acquire SecureWorks

Dell has signed a definitive agreement to acquire SecureWorks, a provider of information security services. SecureWorks protects information assets, improves compliance and …

Secure your iMac with a lock

MacLocks is making iMac theft prevention possible, following up their successful iPad lock. The all new Maximum Security iMac lock makes it easier than ever to lock down an …

Mobile users more vulnerable to phishing attacks

Trusteer recently gained access to the log files of several web servers that were hosting phishing websites. Analyzing these log files provided visibility into how many users …

Assessing, testing and validating Flash content

In this video, Peleus Uhley, the Platform Security Strategist at Adobe, talks about assessing, testing and validating Flash content. He discusses cross-site scripting, code …

Tips to securely shred unnecessary files

Organizations often hold on to records that are no longer needed. These records take up valuable storage space and cost money that could otherwise be saved. Adhering to a …

Adobe PDF format riddled with exploitable features

Adobe’s PDF format and standard has been known for a while now to be easily exploitable and, thus, rather insecure. In the past, attackers have taken advantage not only …

Week in review: less spam, a new Android Trojan and the dark side of Twitter

Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: The security landscape from 2010 to 2011 Vendor-neutral testing and …

Don't miss

Cybersecurity news