Dangers of wireless network use still unknown to many
Nearly half of home wi-fi networks can be hacked in less than five seconds, according to a new study. In an ‘ethical hacking’ experiment conducted across six UK …
Agentless configuration auditing
nCircle announced the new version of its Configuration Compliance Manager, an agentless configuration auditing and file integrity monitoring solution that automatically …
Amazon Seller Central vulnerable to XSS
To demonstrate that the Amazon Seller Central password reset page is vulnerable to an XSS attack, a regular submitter to the XSSed.com website has injected an iFrame tag that …
Poor password practices and how to change them
When it comes to safeguarding personal information online, many people leave their virtual keys in the front door. A survey of more than 2,500 people from the United States, …
FakeAV peddlers targeting computer professionals
Malware peddlers have a general preference for compromising legitimate sites in order to distribute their malicious wares. Sometimes it is easier to compromise an already …
Facebook introduces one-time passwords
For all those who simply must access Facebook from a public computer, the social network introduced the option of receiving a one-time password to be used instead of their …
Full-service virtual SIEM solution
LogLogic announced the release of a full-service virtual SIEM solution. Leveraging the recently released LogLogic 5 software, LogLogic’s MX Virtual delivers all the …
Oracle’s critical patch update advisory for October 2010
Oracle just released a new Critical Patch Update, a collection of patches for multiple security vulnerabilities. The update also includes non-security fixes that are required …
49 vulnerabilities fixed in record Patch Tuesday
In today’s mammoth Patch Tuesday, Microsoft delivers 16 security bulletins that address 49 vulnerabilities affecting Windows, Internet Explorer, Microsoft Office, and …
Data retention system for cyber investigative operations
Bivio Networks announced the launch of its Data Retention System, a data collection and retention system to strengthen cyber security operations for network operators and …
Questions to ask of a cloud provider
At the RSA Conference Europe 2010, the Cloud Security Alliance (CSA) released version 1.0 of the Consensus Assessments Initiative Questionnaire. The questionnaire is available …
RSA offers complete threat management solution
RSA, the Security Division of EMC, announced a set of core technologies and services designed to help organizations more effectively manage information risk and IT compliance …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)