Top 7 threats to cloud computing
The Cloud Security Alliance and HP have presented today new research findings that detail the potential threats linked to the use of cloud services. The report, titled …
Free service for malware detection on websites
Qualys introduced QualysGuard Malware Detection, a free service that proactively scans web sites of any size, anywhere in the world, for malware infections and threats, and …
Inspect your encrypted communications
Netronome announced the Netronome SSL Inspector Appliance for 10 Gbps networks. It can be deployed in without negatively impacting network throughput or latency, and …
Message and web cloud-based security services
M86 Security announced its Secure Messaging Service, a cloud-based Software as a Service solution that incorporates key features from MailMarshal SMTP and includes …
A 184% increase of malicious websites
The volume of spam saw an increase of 5,5 percent, and malicious websites of a whooping 184 percent since January, says the latest MessageLabs Intelligence report. An increase …
Severe IE vulnerability threatens Windows XP users
News of a newly discovered bug in VBScript and Windows Help files in Internet Explorer that could allow a remote attacker to run an arbitrary command has reached Microsoft on …
Automated defense against industrialized cyber attacks
Imperva announced ThreatRadar, an add-on to Imperva’s Web Application Firewall (WAF) that provides automated, reputation-based defense against large scale industrialized …
Waledac disruption only the beginning, says Microsoft
In the wake of the news regarding Microsoft’s disruption of Waledac botnet’s links between its command and control centers and the infected zombie computers by …
58 percent of software vulnerable to security breaches
Veracode released a “State of Software Security” report detailing vulnerabilities found in software that large organizations rely on for business critical …
Fake Virustotal serves malware
The reputation of VirusTotal, the well-known site that allows you to check if a suspicious file is malicious or not, is bound to be somewhat affected by the emergence of a …
Rugged and secure portable drive
Enova’s X-Wall FX provides the hardware real-time cryptographic capability to your entire SATA portable drive including SSD within a tightly integrated USB 2.0 and SATA …
Introducing SOURCE Conference Boston
SOURCE Boston is a security conference that brings security professionals and business leaders together, sails into the Boston’s Seaport Hotel April 21-23, 2010. The …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations