Faster detection coming to Snort
Sourcefire will become the first security vendor to integrate Intel’s QuickAssist Pattern Matching Technology. Snort 2.9, now in beta, leverages the Intel QuickAssist …
Rapid7 launches NeXpose 4.9
Rapid7 announced NeXpose 4.9. Now, government agencies facing Federal Information Processing Standard (FIPS) 140-2 Certification requirements, and enterprises that adopt this …
Mobile devices: Greatest threat to confidential Information?
The use of wireless networks, typically less secure than wired networks, leaves information at greater risk for interception, according to ISACA. From smartphones to USB …
The hidden message in Toy Story 3 is a Facebook scam
The latest scam to hit Facebook users takes advantage of the recently released Toy Story 3: Sophos reports that from the moment you click on the link, the scam follows a well …
63% consider international cyber-espionage acceptable
Sophos published the mid-year 2010 Security Threat Report, revealing the findings of a survey into attitudes towards cyberwarfare and detailing other trends and developments …
Biometric authentication for iPhone apps
PerSay announced its VocalPassword functionality for iPhone, iPad, and iPod Touch applications. The new capability is poised to replace cumbersome login and strong …
Summer holiday security checklist
SecureWorks outlines its top ten tips for IT and security managers to minimize risk during the holiday season. 1. Hackers don’t go on holiday – Many frontline …
Facebook’s 500 millionth member highlights risks
Lancope is warning IT administrators at Global 1000 companies to be aware of the hidden risks to corporate networks because of social networking sites such as Facebook, …
Disk encryption for Mac OS X
Sophos announced SafeGuard Disk Encryption for Mac, which protects against data breaches of confidential and private information on MacBooks and Macs. Today, businesses are …
Software Blade controls over 50,000 Web 2.0 applications and widgets
Check Point announced its new Application Control Software Blade that enables organizations to secure and manage the use of thousands of Web 2.0 applications in the …
Project Vigilant searching for volunteer hackers at Defcon
Project Vigilant, a division of BBHC Global LLC (an information security firm), is a private, semi-secret, volunteer-based organization of “cyber spies” that is …
Microsoft patches the critical Windows LNK vulnerability
An emergency out-of-band update for patching the critical LNK vulnerability has been released by Microsoft. “The vulnerability exists because Windows incorrectly parses …
Featured news
Resources
Don't miss
- Critical Control Web Panel vulnerability is actively exploited (CVE-2025-48703)
- 18 arrested in €300 million global credit card fraud scheme
- PortGPT: How researchers taught an AI to backport security patches automatically
- AI can flag the risk, but only humans can close the loop
- VulnRisk: Open-source vulnerability risk assessment platform