Help Net Security
Data Breach and Encryption Handbook
Cybersecurity risks pose some of the most serious economic and national security challenges of the 21st century. A new book, Data Breach and Encryption Handbook, published by …
Multiple vulnerabilities in Django
Vulnerabilities have been reported in Django, which can be exploited by malicious people to bypass certain security restrictions and conduct script insertion and cross-site …
Van Gogh Museum fan page hit by Facebook scammers
The Facebook page for the Van Gogh Museum in Amsterdam has been targeted by scammers. Messages were posted on the compromised page, including links to a version of the …
IBM secures mobile and instrumented devices
IBM announced new initiatives to extend security to the growing number of mobile and instrumented devices beyond an organization’s own four walls, such as smartphones, …
Security service for Android and Symbian
The new version of F-Secure’s Protection Service for Mobile (PSM 7) enables operators to offer protection and parental control for their customers’ mobile devices. …
7 critical questions to ask before developing a social media policy
Social media disrupts the long-standing rules of business in many ways, but crafting a social media policy is premature unless the designers of the policy answer seven …
Immunet 3.0 introduces custom anti-malware signatures
Sourcefire released Immunet 3.0 which enables users to create custom anti-malware signatures for more accurate protection against targeted attacks and offers a Cloud Recall …
Network situational awareness and retro analysis
Trisul is a Linux based application that passively listens to network traffic and tracks a number of traffic metrics across all layers. It correlates these traffic metrics …
Ruby on Rails CSRF protection bypass vulnerability
There is a vulnerability in Ruby on Rails which could allow an attacker to circumvent the CSRF protection provided. The issue affects versions 2.1.0 and above and has been …
1 in 3 EU Internet users infected by malware
The EU has been at the forefront in leveraging IT advancements. The region has a high Internet penetration rate and over two-thirds of the population uses Internet. However, …
Say “I love you” with the Magic Blue Pill!
It is, after all, the season where we express to our loved ones just how much we care about, appreciate, and truly love them. Since the start of the month Websense Security …
Protected health information breach analysis
Redspin released an analysis of all protected health information breaches publicly recorded between August 2009 and the end of 2010, as per the interim final breach …
Featured news
Resources
Don't miss
- What a future without CVEs means for cyber defense
- What it really takes to build a resilient cyber program
- How cybercriminals exploit psychological triggers in social engineering attacks
- Key tips to stay safe from deepfake and AI threats
- UK retailers under cyber attack: Co-op member data compromised