U.K. seeks cyber experts, offers challenge and educational and job opportunities
It seems that the U.S. is not the only country with a severe shortage of cyber security experts – the U.K. is seeking them out as well. The BBC dubbed it a …
WoW players targeted with phishing emails
World of Warcraft players are once again targeted by a phishing scheme, says F-Secure. Emails purporting to come from Blizzard Entertainment – the creators of WoW …
Week in review: Adobe Reader sandbox, Stuxnet worm and a new 0-day Windows vulnerability
Here’s an overview of some of last week’s most interesting news, reviews, articles and videos: 10 steps for safe web surfing This is a good time for vacation-goers …
Georgian businesses targeted by identity thieves
A week ago, Colorado’s Secretary of State and the state’s Attorney General warned registered businesses that criminals are hijacking corporate names and brands in …
No more free bugs?
The recent announcements from Google and Mozilla that revealed their intent of paying up to $3,133.7 and $3,000 (respectively) for an eligible vulnerability discovered by …
Browser-enforced mitigation against CSRF
This is a video of a talk by Lieven Desmet and Philippe De Ryck at OWASP AppSec Research 2010.
Safari’s AutoFill reveals personal information
A feature of Apple’s Safari browser can be used by hackers to harvest personal information, says Jeremiah Grossman, founder and CTO of WhiteHat Security, in his recent …
Reporting of security breaches should be included in regular reports
Reports that a leading legal expert has called for the mandatory reporting of all data breaches to the UK Information Commissioner’s Office (ICO) – in order to …
Snort 2.8.6.1 released
Snort is an open source network intrusion prevention system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol …
New book: “Ubuntu for Non-Geeks, 4th Edition”
Ubuntu has been hailed as the Linux distribution for newbies, but getting it up and running isn’t always a walk in the park. Linux is different—but the same unique …
Get notified of suspicious Facebook access to your account
For all of you who haven’t figured it out already, there is a simple way to make sure that if someone breaks into your Facebook account and misuses it, you know it …
The modern network security landscape
Businesses must change their mindset on security to help ensure that their networks and vital corporate information are protected from evolving security threats, according to …