Sourcefire acquires Immunet
Sourcefire announced the acquisition of Immunet, a provider of cloud-based anti-malware technologies. The total acquisition price is $21 million in cash, which included $17 …
Exploit code for critical MS Office flaw exploit found in the wild
A critical vulnerability in the way Microsoft Office handles RTF which can allow an attacker to remotely execute arbitrary code on the victim’s computer has been by …
Kneber botnet returns, steals sensitive government documents
The Kneber botnet is running and striking again – this time with a Christmas-themed electronic greeting card seemingly coming from The White House and targeting …
Critical vulnerability in ImgBurn
A vulnerability has been discovered in ImgBurn, which can be exploited by malicious people to compromise a user’s system, according to Secunia. The vulnerability is …
Fake Microsoft security update carries Autorun worm
An e-mail supposedly coming from Microsoft and urging the recipients to update their Windows has started making rounds yesterday: There are a lot of people out there who will …
GoFlex for Mac external drives easily used with Windows
Addressing the personal preferences of the Mac community, Seagate introduced a new collection of GoFlex for Mac external drives designed to make it easy for those who use Mac …
Move to electronic health records raises privacy and security concerns
What are the top security and privacy issues facing the healthcare industry in 2011? A panel of healthcare experts representing privacy, trends, technology, regulatory, data …
QualysGuard integration with BeyondTrust PowerBroker
BeyondTrust and Qualys announced a technology partnership to integrate QualysGuard with BeyondTrust’s PowerBroker for Unix Servers. The integration will enable customers …
Microsoft confirms unpatched Windows vulnerability
Microsoft released a new security advisory to address a publicly disclosed vulnerability affecting Microsoft Windows’ Graphics Rendering Engine on Windows Vista, Server …
The evolution of cyber criminal operations
There is a concerning evolutionary step cyber criminal operations are taking to more effectively diversify the distribution of their ill-gotten gains, according to Fortinet. …
Is Google losing its fight against spam?
Once upon a time, Google was unequivocally the best and the most popular search engine in the world. Ranking pages by how they were interconnected (linked) to other sites, …
Most federal employees take IT security seriously
Most Federal employees go beyond baseline IT security requirements, according to a new survey by the Government Business Council. While 97 percent of Federal employees are …
Featured news
Resources
Don't miss
- Recently fixed HPE OneView flaw is being exploited (CVE-2025-37164)
- PoC released for unauthenticated RCE in Trend Micro Apex Central (CVE-2025-69258)
- Cybercriminals are scaling phishing attacks with ready-made kits
- StackRox: Open-source Kubernetes security platform
- What happens to insider risk when AI becomes a coworker