Information security guidelines for the healthcare industry
SecureWorks recommends the guidelines outlined below. Security risk assessments Performing regular security risk assessments will give your organization a much better …
Splunk 4.0.9 released
Splunk released version 4.0.9 of the Splunk IT search and analysis engine. The following issues have been resolved in this release: Some issues related to high memory …
EFF researches Web browser tracking
Do you ever wonder what fingerprints your browser leaves behind as you surf the web? Peter Eckersley from the EFF comments: “Traditionally, people assume they can …
IronKey delivers mobile data security to government
IronKey and Carahsoft Technology announced that Carashsoft will distribute IronKey’s managed portable storage, authentication and trusted virtual computing solutions for …
Scientology attacker to serve one-year prison sentence
A Nebraska man agreed today to plead guilty to participating in an attack on Church of Scientology websites in January 2008 that shut down the group’s websites. Brian …
The state of encryption in Europe
It is a well know fact that IT employees are a special breed. They may be seen as overly paranoid and sometimes very singleminded and demanding about the issue of security and …
Digital fingerprints to identify hackers
How can you retaliate against a cyber attacker if you don’t know who he is? As we have witnessed lately, attribution of an attack is quickly becoming one of the biggest …
Top 10 tips for protecting business data
According to the Federal Trade Commission, approximately nine million Americans have their identities stolen each year. Data theft is a growing issue that can cost consumers …
Rogue software details: Live Enterprise Suite
Live Enterprise Suite is a rogue security application. In order to remove it, find out what files to look for below. Known system changes: Files c:\CommonDesktop\Internet …
Basic vulnerability found in most voice encryption products
IT security blogger Notrax claims to have successfully intercepted and compromised phone calls made using 12 commercially available mobile voice encryption products. Using a …
Many cybercrimes go unreported
More than half of the 500 respondents (58%) of the 2010 CyberSecurity Watch Survey believe they are more prepared to prevent, detect, respond to or recover from a cybercrime …
Hacker attacks on healthcare organizations double
SecureWorks reported that attempted hacker attacks launched at its healthcare clients doubled in the fourth quarter of 2009. Attempted attacks increased from an average of …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage