Week in review: cyber war, SQL injection, spam evolution, Apple and Microsoft patches
Here’s an overview of some of last week’s most interesting news, interviews and articles: Cyber war is coming, the impact could be huge Admiral Mike McConnell, …
Serious Adobe Flash vulnerability
Foreground Security discovered a critical vulnerability in Adobe Flash. This vulnerability allows the same-origin policy of Adobe Flash to be exploited to allow nearly any …
WordPress 2.8.6 security release
WordPress 2.8.6 fixes two security problems that can be exploited by registered, logged in users who have posting privileges. If you have untrusted authors on your blog, …
Biggest website security weaknesses
WhiteHat Security released a report assembled from real-world website security data, is a high-level perspective on major website security issues that continue to compromise …
Apple Safari 4.0.4 patches critical vulnerabilities
Safari 4.0.4 includes improvements to performance, stability, and security. ColorSync An integer overflow exists in the handling of images with an embedded color profile, …
Real-world data on software security initiatives
Cigital and Fortify Software released the Building Security In Maturity Model for Europe or “BSIMM Europe,” an application of the industry’s first-ever set …
How to protect personal information
How do you know if your online activities are secure, or if trouble is lurking around the corner? IEEE has brought together its security expert members to evaluate the most …
Cybersecurity threats agencies face every day
CDW Government released its 2009 Federal Cybersecurity Report, which found that across Federal civilian and Department of Defense agencies, the number and severity of …
Breakdown of November Microsoft Patch Tuesday vulnerabilities
Qualys’ Richie Lai, vulnerability research director and Amol Sarwate, vulnerability labs manager, discuss this months Microsoft Patch Tuesday release.
Tracking Internet use and secure browsing
GFI Software released a new version of GFI WebMonitor that gives organizations control of the use of the Internet by employees in the workplace, performing both Internet …
Koobface worm creates Facebook accounts to spread
According to TrendLabs, there is a new Koobface component that makes Internet Explorer create Facebook accounts. It automates the whole process – the browser registers …
International hacking ring caught in $9 million fraud
Three individuals from Russia, Ukraine and Moldova have been indicted by a federal grand jury on charges of hacking into a computer network operated by the credit card …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations