Hot information security topics at InfoSec World 2010
InfoSec World will be taking place on April 19-21, 2010 in Orlando. With multiple tracks, dozens of case studies, 12 in-depth workshops and three specialized summits, InfoSec …
Week in review: SASFIS Trojan, phishing escalation and IE patch
Here’s an overview of some of last week’s most interesting news and articles: Online cybercriminal DarkMarket closed, founder arrested DarkMarket has been shut …
80% of U.S. government domains still without DNSSEC
Eighty percent of all U.S. federal agencies didn’t succeed in deploying DNSSEC on their Web sites by the end of 2009, as demanded by the U.S.’s government mandate …
Tor Project infrastructure breached, users advised to upgrade
Tor users have been advised to upgrade to Tor 0.2.1.22 or 0.2.2.7-alpha, following a security breach that left two of the seven directory authorities compromised (moria1 and …
95% of email is spam
The European Network and Information Security Agency (ENISA) released its new spam report which looks at spam budgets, impact of spam and spam management. The survey targeted …
Unknown virus brings down UK university network
The network of UK’s University of Exeter was hit on Monday by what they claim “is a completely new virus and we are the only organisation in the world to …
More privacy rights violations in China
In a move that has been interpreted as yet another violation of privacy rights, the Chinese government has announced a campaign against pornography that will include automatic …
MiFi security weakness highlights need for code auditing
News reports that the GPS-enabled Wireless MiFi unit can be persuaded to reveal its position across the internet – without the user being aware of the information leak …
Need for better identity protection
Online banking continues to provide significant levels of convenience for consumers, with quick access to checking and savings accounts, the ability to pay bills …
Free backup and recovery software
Paragon Backup & Recovery 10.1 Free Edition is a disaster recovery tool for stand-alone Windows-based PCs. This tool allows you to take complete control of your …
IronKey launches Trusted Virtual Computing Initiative
IronKey launched its Trusted Virtual Computing initiative to enable organizations to realize the cost-effective benefits of virtualization without compromising security. …
E-crime gangs turn to expanded extortion model
A new report by the APWG reveals that e-crime syndicates are expanding conventional, email-based phishing campaigns and their target base, as the report returned record highs …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage