Full-service virtual SIEM solution
LogLogic announced the release of a full-service virtual SIEM solution. Leveraging the recently released LogLogic 5 software, LogLogic’s MX Virtual delivers all the …
Oracle’s critical patch update advisory for October 2010
Oracle just released a new Critical Patch Update, a collection of patches for multiple security vulnerabilities. The update also includes non-security fixes that are required …
49 vulnerabilities fixed in record Patch Tuesday
In today’s mammoth Patch Tuesday, Microsoft delivers 16 security bulletins that address 49 vulnerabilities affecting Windows, Internet Explorer, Microsoft Office, and …
Data retention system for cyber investigative operations
Bivio Networks announced the launch of its Data Retention System, a data collection and retention system to strengthen cyber security operations for network operators and …
Questions to ask of a cloud provider
At the RSA Conference Europe 2010, the Cloud Security Alliance (CSA) released version 1.0 of the Consensus Assessments Initiative Questionnaire. The questionnaire is available …
RSA offers complete threat management solution
RSA, the Security Division of EMC, announced a set of core technologies and services designed to help organizations more effectively manage information risk and IT compliance …
Long-awaited jailbreaking tool released
Greenpois0n, the jailbreaking tool whose release was eagerly awaited by the jaibreaking community, and the wait for which was even misused by malware peddlers, was finally …
HID Global acquires ActivIdentity
HID Global announced that parent company ASSA ABLOY has entered into a definitive agreement to acquire ActivIdentity. ActivIdentity provides identity assurance solutions, …
Bugat Trojan linked to LinkedIn phishing campaign
Researchers have discovered a new version of the Bugat financial malware used to commit online fraud. Bugat was distributed in the recent phishing campaign targeting LinkedIn …
Four virtual appliances for cloud security
Fortinet announced four new virtual appliances that extend the company’s ability to deliver security across virtualized and cloud environments. The FortiGate, …
Social media sites and universities increasingly targeted by phishers
Social media sites and educational institutions were increasingly targeted by phishers who continued to expand the targets of their attacks in the first half of 2010. With …
A foolproof drive-by-download blocking tool?
A seemingly foolproof tool for blocking drive-by-download attacks has been developed by a group of researchers at the Georgia Institute of Technology and California-based SRI …
Featured news
Resources
Don't miss
- When trusted AI connections turn hostile
- Identifying risky candidates: Practical steps for security leaders
- Humanoid robot found vulnerable to Bluetooth hack, data leaks to China
- F5 data breach: “Nation-state attackers” stole BIG-IP source code, vulnerability info
- Microsoft patches three zero-days actively exploited by attackers