Microsoft patches record 40 vulnerabilities
Today Microsoft released 17 security bulletins which address 40 vulnerabilities affecting Microsoft Office, Windows, Internet Explorer, SharePoint Server and Exchange. This …
New Trojan hijacks shortcuts to ensure its execution
A new information-stealing Trojan that seems to be Chinese in origin has been detected by Avira’ researchers. It is designed to steal usernames and passwords associated …
Fake Hallmark greeting card carries malware
A spam campaign consisting of e-mails posing as Hallmark Christmas cards and containing a malicious attachment has been detected by MX Lab researchers: Coming from a spoofed …
Julian Assange granted bail
WikiLeaks founder and director Julian Assange has been granted bail and will likely be freed in the next few days – as soon as the £240,000 in security are raised …
Hacktivism and social engineering emerge as top threats
Hacktivism and more profit-oriented malware, social engineering and malicious codes with the ability to adapt to avoid detection will be the main threats in the coming year, …
Top wireless security trends for 2011
Today’s security needs are different than they were a decade ago. People are ‘connected’ thanks to mobile devices so they can stay linked to their security …
Smart grid cyber security in 2011: Untenable meets intractable
In the presentation below, you can listen to Andy Bochman, the Energy Security Lead at IBM, looking back and looking forward on smart grid cyber security. Andy takes a look at …
Metasploit achieves CVE compliance
Rapid7 announced that Metasploit Pro and Metasploit Express have achieved Common Vulnerabilities and Exposures (CVE) compliance. CVE associates unique identifiers to security …
Use Android as a RSA SecurID authenticator
RSA announced their SecurID Software Token for Android that is engineered to enable an Android powered device to be used as an RSA SecurID authenticator, providing convenient …
First 1TB 2.5-inch enterprise HDD
Seagate introduced Constellation.2, the first 2.5-inch enterprise-class hard drive to reach 1TB capacity. The drive is designed for server storage applications and offers a …
Gawker Media breach claimed by Gnosis
The credit for the breach of Gawker Media has been claimed by a group that goes by the name of Gnosis, and was apparently a way to get back at the company, its staff and its …
Data privacy a primary concern in the smart grid world
Privacy has emerged as the number one concern related to data security and management, with data governance as an emerging concern, according to IDC Energy Insights. As …
Featured news
Resources
Don't miss
- Unpatched Windows vulnerability continues to be exploited by APTs (CVE-2025-9491)
- CISA and partners take action as Microsoft Exchange security risks mount
- Shadow AI: New ideas emerge to tackle an old problem in new form
- AI chatbots are sliding toward a privacy crisis
- You can’t audit how AI thinks, but you can audit what it does