Firewall Builder 4.0 released
Firewall Builder helps you write and manage configuration for your firewalls. It writes iptables commands, pf.conf file, Cisco router access lists or PIX configuration for …
Deleting yourself from the Web
If there is one positive thing that the recent Facebook privacy changes have brought, it is a raised awareness about the fact that we ourselves are the best guardians of our …
Canadian Pharmacy no longer top spammed brand
According to the statistics by M86 Security Labs, Canadian Pharmacy – the long-standing champion of spammed affiliate brands – made way for the new reigning king: …
Phishers want your Apple gift card
Apple has received a lot of attention lately: the lost iPhone, the Apple vs Adobe bickering about Flash, but it was mostly the release of the iPad and its amazing popularity …
Security risks of web application programming languages
A new WhiteHat report examined the security of specific programming languages. Until now, no other website security study has provided detailed research on how programming …
Facebook security bug lets you eavesdrop on your friends’ chats
On Wednesday morning, a Facebook security flaw allowed users for a few hours to get a glimpse at their friends’ private chats and their their latest pending …
Freeware detects performance loss across the network
Disk Performance Analyzer for Networks 3.0 (DPAN) is a free utility that detects and reports severe fragmentation-related performance loss across the network, all from one …
Facebook Social Plug-ins privacy concerns sorted out by Palo Alto Networks
Facebook users in enterprises are susceptible to having their confidential data shared with third parties because of recent changes at Facebook, which cause behavioral data …
Fake Adobe Security Update malware campaign
Red Condor issued a warning of a new malware threat crafted to appear as an email thread discussing vulnerabilities in Adobe software. The campaign targets Adobe customers and …
Compliance Enforcer 3.0 released
Compliance Enforcer 3.0 leverages nexTier’s DLP algorithms with semantic analysis to provide end-users with auto-classification features, the ability to customize …
Qualys and RSA expand IT-GRC collaboration
Qualys and RSA expanded their technology collaboration to make QualysGuard vulnerability management and IT policy compliance data available to RSA’s client base. The …
Ex-con helps feds foil an ATM hacking scheme
Thor Alexander Morris had a plan. The plan involved reprograming certain ATMs so that they would overpay him when he made a withdrawal, giving out $20 instead of $1 bills …
Featured news
Resources
Don't miss
- Okta users under attack: Modern phishing kits are turbocharging vishing attacks
- One-time SMS links that never expire can expose personal data for years
- More employees get AI tools, fewer rely on them at work
- Energy sector orgs targeted with AiTM phishing campaign
- Exposed training apps are showing up in active cloud attacks