Companies sever ties with HBGary
The HBGary breach and the publication of internal company documents – including the potentially damning proposal developed by HBGary, Palantir Technologies and Berico …
Hardware security modules for cryptographic protection
Thales announced that Thales nShield Solo hardware security modules (HSMs) have been integrated into Imprivata OneSign. Designed to protect cryptographic keys and sensitive …
SMS Trojan masquerading as valentine-sending mobile application
It’s Valentine’s Day, and for all of you who are getting ready to send a valentine to the special people in your life, Microsoft has a warning: be careful what …
Central management of self-encrypting hard drives
Lenovo and WinMagic announced SecureDoc for Lenovo, a full-disk encryption solution for central management of new self-encryption hard drives that meet the Opal standard …
Week in review: HBGary breach, corporate espionage and 2-step authentication by Google
Here’s an overview of some of last week’s most interesting news and articles: Hackers compromised Nasdaq’s network Hackers continue to breach systems of …
Fake scanned documents lead to Zeus infection
A new spam e-mail campaign is currently underway, and takes the form of a document scanned and sent by a Xerox WorkCentre Pro scanner: The attachment is a specially crafted …
Researcher offers free voice and text encryption app to Egyptians
The explosive situation in Egypt has mobilized many repression-hating individuals in the world to try to do something to support the country’s citizens in their efforts …
Nigerian scammers impersonate FBI agents
The so-called “Nigerian scams” have been a staple for online scammers for a while now, most of whom are located in Nigeria – ergo the name. Attempts might …
Chinese hackers behind espionage attacks hitting Western oil firms?
Hackers have targeted five international oil companies and have extracted sensitive corporate information about oil- and gas-field operations, project financing and bidding, …
What Stuxnet means for the process industry
The Stuxnet and Aurora attacks have shown us that malware development has become a professional job. These threats targeting the process industry were written by highly …
2-step authentication finally available to Google’s non-paying customers
Google’s corporate users have had the option of using two-factor (two-step) authentication for nearly five months now, and the time has finally come for non-paying …
Organizations spend 127 hours per month managing on-site security solutions
Organizations spend an average of 127 hours per month managing on-site security solutions and related problems, according to new research from Webroot. The top time thieves …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits