Help Net Security
Half of organizations face downtime due to patching
53 per cent of companies are affected by downtime when it comes to deploying patches, according to Dell KACE. A further 29 per cent of companies had IT teams conduct patching …
AVG releases Premium Security
AVG announced Premium Security, the Internet security solution that surveys the Web for incidents of stolen identity. It includes AVG Identity Alert, AVG Internet Security and …
Phishers becoming sophisticated marketers of fraud
Phishers are becoming more sophisticated criminal marketers, according to a report by IID which documents a quarter that was a watershed for data breaches, from large-scale …
Managers don’t understand the power of IT
While the world is distracted with the continuing reports of phone hacking practices and other corporate data breaches, it is revealed that hundreds of organizations are now …
First OpenStack Infrastructure-as-a-Service cloud solution
Dell announced the Dell OpenStack Cloud Solution, which integrates the OpenStack cloud operating system, cloud-optimized Dell PowerEdge C servers, the Dell-developed …
Samba XSS and request forgery vulnerabilities
Two vulnerabilities have been reported in Samba, which can be exploited by malicious people to conduct cross-site scripting and request forgery attacks. 1. The Samba Web …
22% in US admit to potential abuse of private data
22% of US, 29% of Australian and 48% of British employees who have access to their employer’s or client’s private data, would feel comfortable doing something with …
Phishing attacks on Facebook intensify
There was a significant increase in the amount of phishing attacks on Facebook, as well as other social networking sites such as Habbo in June, according to the latest spam …
Metasploit Pro 4.0 released
Rapid7 launched Metasploit Pro 4.0, a penetration testing solution that provides security professionals with a better view of their threat landscape by integrating with more …
Entrust strengthens mobile security with device authentication
In an era when mobile devices are commonplace, Entrust introduces a straightforward method for adding digital certificates to mobile devices – and with little management …
New OAuth toolkit
Layer 7 Technologies unveiled its OAuth Toolkit, an enterprise-class solution to provide a generalized framework for handling a broad range of OAuth scenarios across cloud, …
Mac OS X Lion login password easily revealed
Mac OS X stores user login passwords in system memory even if the computer is locked or put into a sleep mode. The vulnerability is present in all modern versions of Mac OS X, …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware