Help Net Security
A guideline for critical information infrastructure governance
ENISA launched a new publication on National Risk Management (NRM) preparedness. The report sets out the essential elements as a guideline for the governance of NRM in …
SpyEye Trojan attacks Verizon’s online payment page
Trusteer discovered a configuration of the SpyEye Trojan targeting Verizon’s online payment page and attempting to steal payment card information. The attack took place …
Worrying trend in credit card data security
A new BitDefender study which has revealed some concerning statistics on the personal protection of credit card data. 97% of 2,210 respondents aged 18 to 65 said they …
New vulnerability reporting framework
The Industry Consortium for Advancement of Security on the Internet (ICASI) published of its Common Vulnerability Reporting Framework (CVRF) Version 1.0. CVRF is an XML-based …
Microsoft Forefront Endpoint Protection 2012 Beta released
Microsoft released Forefront Endpoint Protection 2012 Beta which continues to provide proactive protection against known and unknown threats using multiple technologies in the …
Mobile Encryption for iOS and Android
Sophos announced a number of new enterprise product lines that together offer protection anywhere and on any device. Sophos Mobile Control provides lightweight device …
VirtualBox 4.0.8 released
VirtualBox enables desktop or laptop computers to run multiple operating systems simultaneously, and supports a variety of host operating systems, including Windows, Mac OS X, …
IBM Informix Storage Manager security bypass
A vulnerability has been reported in IBM Informix Storage Manager, which can be exploited by malicious people to bypass certain security restrictions, according to Secunia. …
Microsoft investigates the current threat landscape
Microsoft published volume 10 of the its Security Intelligence Report (SIRv10) which provides perspectives on software vulnerabilities, software vulnerability exploits, …
VMware acquires Shavlik Technologies
VMware has entered into a definitive agreement to acquire Shavlik Technologies, which provides a portfolio of on-premise and SaaS-based management solutions that enable SMBs …
iPhone-enabled wireless multimeter
Redfish Instruments introduced the iDVM Digital Multimeter which wirelessly connects to an iPhone, iPad, or iPod Touch via an ad hoc wireless network allowing users to …
Breaches drive enterprises to prioritize access governance
Aveksa announced the findings of a recent survey conducted to examine how companies are re-evaluating their IT security measures following the recent security breaches at …
Featured news
Resources
Don't miss
- Cybercriminals exploit RMM tools to steal real-world cargo
- Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
- How nations build and defend their cyberspace capabilities
- Uncovering the risks of unmanaged identities
- Deepfakes, fraud, and the fight for trust online