Under protected corporate secrets
Enterprises are investing heavily in compliance and protection against accidental leaks of custodial data (such as customer information), but under-investing in protection …
Splunk 4.1 released
Splunk provides the ability for users to search, monitor and analyze live streaming IT data as well as terabytes of historical data, all from the same interface. Splunk 4.1 …
Healthcare industry overlooks critical gaps in data security
As the healthcare industry prepares for a major shift to electronic health records (EHRs) over the next several years, a new bi-annual report provides data that shows that …
Control Windows desktop administration rights for free
ScriptLogic introduced Privilege Authority, a free solution that allows IT administrators to maintain control of administrator rights while giving end users specific and …
Insufficient employee security training for the cloud
Symantec and the Ponemon Institute announced the findings of a joint survey of IT professionals. The survey revealed that most organizations lack the procedures, policies and …
ZeuS vs. Zeus Killer
Back at the beginning of February, we wrote about the SpyEye toolkit and its author’s intention of encroaching upon Zeus toolkit’s turf by offering a feature that …
Fake gift card scams on Facebook
Whole Foods Market, a Texas supermarket chain, has been fighting the latest gift card scam that takes advantage of the company well-known brand by offering a $500 gift card to …
Free random password generator
The IObit Random Password Generator enables you to produce strong, not easy to crack, passwords for privacy protection – for free. The tool can store randomly generated …
Week in review: Exploitable PDF feature, Google phishing detection and Facebook privacy changes
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: 90% of critical Windows 7 vulnerabilities are mitigated by …
How to detect a phishing site, the Google way
Google analyzes millions of pages per day when searching for phishing behavior. This kind of activity is, of course, not done by people but by computers. The computers are …
Global response to Conficker threat: Model for future cyber threat response?
The problem with Conficker is that we still don’t know what it’s for. Yes, an estimated 7 million computers are infected worldwide, but they don’t show signs …
Beware fake eBay security alert
Red Condor issued a warning of a new blended email threat that appears to be a security alert from eBay. The email message with the subject line “eBay Procedural Warning …