Fake Virustotal serves malware
The reputation of VirusTotal, the well-known site that allows you to check if a suspicious file is malicious or not, is bound to be somewhat affected by the emergence of a …
Rugged and secure portable drive
Enova’s X-Wall FX provides the hardware real-time cryptographic capability to your entire SATA portable drive including SSD within a tightly integrated USB 2.0 and SATA …
Introducing SOURCE Conference Boston
SOURCE Boston is a security conference that brings security professionals and business leaders together, sails into the Boston’s Seaport Hotel April 21-23, 2010. The …
Protect every asset in the cloud infrastructure
Lieberman Software announced an enhancement to Enterprise Random Password Manager (ERPM) that now delivers fine-grain management features to protect every asset in the cloud …
Week in review: Twitter phishing, rogue software and Waledac botnet takedown
Here’s an overview of some of last week’s most interesting news and articles: 75% of organizations suffered a cyber attack 42 percent of organizations rate …
Relentlessly annoying banking Trojan
The majority of banking trojans prefers to hide in the deepest recesses of your computer and silently steal your login credentials. But CA’s researchers recently came …
SQL injection attack show-and-tell
SQL injection has, for a long time now, found its way to the top places of the list of favorite attack vectors of cyber criminals. Its popularity is, without a doubt, due to …
Microsoft cripples the Waledac botnet
A few days ago, Microsoft has requested and was granted a temporary restraining order that resulted in the takedown of 273 Internet domains that are believed to belong to …
Mobile workforce shift will cause security headache
A recent iPass report highlights the rising numbers of workers are moving to a truly mobile working environment confirms what many in the IT security industry have suspected …
Cloud based Web application security assessment
Cenzic released ClickToSecure Cloud, a self-service, completely cloud based Web application security assessment solution. With this new cloud platform, Cenzic has created open …
Pros and cons of biometric authentication
In theory, biometrics are a great way to authenticate a user: it’s impossible to lose your fingerprint (barring the most gruesome of developments), you can’t …
International Secure Systems Development Conference
The International Secure Systems Development Conference, taking place in London during May 2010, addresses the key issues around designing-in security for standard and …