Cyber security report reveals Feds’ take on FISMA 2.0
A new study examines Federal CIO and CISO perceptions and usage experiences for CyberScope, the new Federal Information Security Management Act’s (FISMA) online …
QualysGuard integrates with Cyber-Ark’s Privileged Identity Management Suite
Qualys and Cyber-Ark announced QualysGuard integration with Cyber-Ark’s Privileged Identity Management (PIM) Suite. With this integration, customers can store and manage …
CSC acquires Vulnerability Research Labs
CSC has acquired the business of Vulnerability Research Labs (VRL), a privately held cyber threat intelligence firm. The acquisition enables CSC to enhance its cybersecurity …
Plane-tracking phone app is a boon for terrorists?
An application for the iPhone and Android-running devices that allows users to establish the exact location of an airplane by simply pointing it in its direction while it …
The state of compliance
While credit card data breaches remain all too common, a new report from Verizon Business shows that following industry security standards can dramatically reduce such …
Week in review: Stuxnet, WoW phishing and ZeuS gangs smackdown
Here’s an overview of some of last week’s most interesting news, videos, articles and interviews: 60% of organizations suffered $2 million losses for Web 2.0 …
We are two clicks away from malware
Most Internet users are only two clicks away from malicious content from top sites, poisoned search results, and malicious links, according to Websense. The path to malware …
Android applications sharing your data
A group consisting of researchers from Duke University, Pennsylvania State University and Intel Labs has recently created a tool that allowed them to analyze data flows out of …
Host-based IDS OSSEC 2.5 released
The OSSEC team announced the general availability of OSSEC version 2.5. What’s new? Added support for “report_changes” on syscheck to show what was changed …
Adobe to patch critical security issues
Adobe is planning to release updates for Adobe Reader 9.3.4 for Windows, Macintosh and UNIX, Adobe Acrobat 9.3.4 for Windows and Macintosh, and Adobe Reader 8.2.4 and Acrobat …
Stuxnet related searches poisoned
It was only a matter of time when criminals would use the omnipresent Stuxnet threat to lure victims into downloading malware and, according to Trend Micro researchers, the …
37 charged in global ZeuS bank fraud schemes that stole millions
Manhattan U.S. Attorney charged 37 defendants, in 21 separate cases, for their roles in global bank fraud schemes that allegedly used hundreds of false-name bank accounts to …
Featured news
Resources
Don't miss
- 6 considerations for 2025 cybersecurity investment decisions
- BlackLock ransomware onslaught: What to expect and how to fight it
- Cybercriminals shift focus to social media as attacks reach historic highs
- The risks of autonomous AI in machine-to-machine interactions
- Balancing cloud security with performance and availability