Fake drug peddlers hijack academic websites
Legal sites are often compromised and used as a stepping stone through which the user is taken to a malicious site. The latest of this kind of schemes has seen a string of …
Week in review: Aurora prevention, RSA Conference, and Mariposa botnet takedown
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Severe IE vulnerability threatens Windows XP users News of a …
Security pros doubt their network-based security
Brocade’s “man-on-the-street” survey at this week’s RSA conference in San Francisco, revealed that 47 percent of respondents believe their network …
Photos: RSA Conference 2010 Expo, part 5
Here’s a glance at the RSA Conference 2009 expo floor. The featured companies are: Entrust, SmartSwipe, Lumension, M86 Security, BlackBerry and Blockmaster.
An alternative to a web application firewall
XyberSecure presented XyberShield, a web application security service and real-time website threat identification and determent solution. Using its proprietary behavioral …
Is there a solution to the ZeuS problem?
Zeus Trojan has for a while now become almost a synonym for banking malware. Its sneakiness and the ability of its makers to constantly change and adapt it would be admirable, …
Mac AV solution with “panic button”
“Macs are safer than PCs but that doesn’t necessarily mean that they’re more secure. Many of today’s threats are browser based and Mac users are …
Malicious files with fake digital signatures
Signing malicious files with fake signatures that at first glance seem authentic is one of the new methods used by malware writers to add an air of legitimacy to them and …
Email encryption service with virtualization support
Zix Corporation announced the next generation of the company’s Email Encryption Service. ZixGateway 4.0 is the latest generation of the company’s directory driven, …
Photos: RSA Conference 2010 Expo, part 4
Here’s a glance at the RSA Conference 2009 expo floor. The featured companies are: Cenzic, Symantec, ESET, Trend Micro, Sourcefire and TriGeo.
RSA 2010 – Wireless security monitoring results
Motorola AirDefense performed its traditional wireless security monitoring at the RSA 2010 conference. The monitoring was conducted from Day 1 through Day 2 of the conference …
Survey reveals IT skills in demand
Defying expectations amid a global recession, the results of the (ISC)2 2010 Career Impact Survey released today found that more than half of information security …
Featured news
Resources
Don't miss
- Microsoft introduces protection against email bombing
- Sudo local privilege escalation vulnerabilities fixed (CVE-2025-32462, CVE-2025-32463)
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it