Personal data of 3,000 US Airways pilots leaked by insider?
A data breach that goes back to October 2009 has recently been brought to light by the US Airline Pilots Association (USAPA), which admitted that it has been working for …
Holes found in majority of leading network firewalls
Firewalls are well understood as the main barriers between an organization’s internal and external networks. Over the past 25 years, they have become the foundation of …
Email malware jumps 400% after Rustock takedown
Malware sent via email increased by 400% in the last week of March 2011, Commtouch reported today. The significant increase was detected two weeks after the takedown of the …
Enterprises don’t understand IT risk
A global survey of more than 1,240 IT decision makers at large enterprises – 72% of which have more than 1,000 employees – found that one third (33%) of …
Secunia Vulnerability Intelligence Manager 3.1 released
Secunia announced enhancements to the award-winning Secunia Vulnerability Intelligence Manager (VIM). The Secunia VIM is compliant with the vulnerability database requirements …
Ransom Trojan locks Windows
Ransomware is slowly becoming quite a problem, and the latest one spotted by F-Secure tries a rather innovative approach: it locks the victims out of Windows and doesn’t …
7 steps to protect against online fraud
Of the three million respondents to a SonicWALL quiz, only 7.4% answered all of the questions correctly. When asked to determine whether a suspect email was a phishing e-mail …
IEEE launches 40Gb/s ethernet optical interface standard
IEEE announced the ratification of IEEE 802.3bgTM-2011, 40Gb/s Ethernet Single-mode fiber optical interface, a new standard enabling 40 Gb/s serial Ethernet interfaces to be …
New HP application security solutions
HP announced the first application security analysis solution that discovers the root cause of software vulnerabilities by observing attacks in real-time. HP Fortify Real-Time …
B-Sides Vienna welcomes hackers in June
B-Sides Vienna is a hacker conference targeted at security researchers, system and network operators, application developers, hardware hackers, hackerspace members, and …
Government-owned credit cards compromised in contractor breach
Numbers and expiry dates of over 600 credit cards belonging to government and law enforcement employees have been stolen and exposed after an attack aimed at an Australian …
Maturity model for information security management
The Open Group announced a new information security management standard, The Open Group Information Security Management Maturity Model (O-ISM3), which enables the creation of …
Featured news
Resources
Don't miss
- Creative cybersecurity strategies for resource-constrained institutions
- Product showcase: UserLock IAM for Active Directory
- Cryptomixer crypto laundering service taken down by law enforcement
- Treating MCP like an API creates security blind spots
- Offensive cyber power is spreading fast and changing global security