Social networking “Bill of Rights” released
A little over a month ago, the Electronic Frontier Foundation offered their suggestions about what a social networking “bill of rights” should contain. Last week …
Firefox 3.6.4 fixes several security issues
Mozilla released Firefox 3.6.4 that fixes several security issues as well as stability issues. User tracking across sites using Math.random() Security researcher Amit Klein …
Secure social media management
Cyveillance announced the availability of Secure Social Media Management, which provides organizations with professional review and consultation of social media policies and …
Twilight app turns mobile phones into zombies
While not the first one who has thought of demonstrating the ability of using an application to create a botnet of Android-running mobile devices, researcher Jon …
Basic TCP/IP analysis
Hansang Bae leads the Network/Application Performance Engineering Team with direct responsibility for Packet Capture Infrastructure at Citi. In the video below he discusses …
How much is Facebook data worth?
Facebook has over 400 million active users. Can you even imagine how much freely given, highly accurate user data is stored on each of those accounts? The marketing industry …
Teens share alarming amounts of personal info online
McAfee released “The Secret Life of Teens,” a survey that surveyed 955 U.S. 13-17 year olds (including 593 teens ages 13-15 and 362 teens aged 16-17) and reveals …
The ultimate Black Hat 2010 party by Qualys
The Qualys party at Black Hat featuring integration partners will take place at the Jet Mirage Nightclub on Wednesday, July 28, 8PM – 2AM. Dance the night away to …
Online family protection for iPhone, iPod touch and iPad
McAfee announced Family Protection iPhone, iPod touch and iPad Edition which provides strong parental controls to keep children safe when they are browsing the Internet on an …
Patch management from the cloud
In today’s IT world, devices are mobile and the Internet has become the corporate network. The result is additional challenges for IT Managers to keep devices patched …
Technical-support-by-phone scams
So, it turns out that your computer doesn’t even have to be infected for you to become a target for people who offer to disinfect it – and charge you, of course! …
Trustwave acquires Breach Security
Trustwave, a provider of information security and compliance solutions, has acquired Breach Security, a provider of web application firewall technology. The terms of the deal …
Featured news
Resources
Don't miss
- Why we must go beyond tooling and CVEs to illuminate security blind spots
- Making security and development co-owners of DevSecOps
- Review: Passwork 7.0, self-hosted password manager for business
- What a mature OT security program looks like in practice
- Machine unlearning gets a practical privacy upgrade