Secure Windows desktops by removing administrator privileges
BeyondTrust released PowerBroker for Windows 6.0, an identity management solution that allows customers to take a system’s overall risk into context when deciding what …
Microsoft to release five bulletins next week
Microsoft released advance notification for next week’s Microsoft patch and it looks like we’re getting only five bulletins. We received several comments on what …
Rogue employees, malware exploits and unauthorized software
While IT security professionals recognize the threat posed by unwitting employees, many still admit to allowing administrative privileges to go unmanaged, making organizations …
Tripwire includes web application scanning with IP360
Tripwire announced that dynamic web application scanning is now included in IP360. This critical functionality enables customers to detect and prioritize web application …
U.S. Veterans Affairs Dept. repeatedly targeted by foreign hackers
Conflicting claims were heard at Tuesday’s hearing of the House Veterans’ Affairs oversight and investigations subcommittee, leaving open the question on whether …
Smart TVs vulnerable to a host of attacks
Smart (connected) TVs are becoming a common fixture in Western world homes, and most users consider it a handy tool and an improvement over the basic television sets of …
NSA legally forces Verizon to hand over all phone records on a daily basis
An order issued by the secret Foreign Intelligence Surveillance Court (FISC) that compels Verizon to share metadata on all the phone calls its users make with the NSA has been …
Fake Mt. Gox pages aim to infect Bitcoin users
Mt. Gox is the the largest Bitcoin exchange in the world, and as such it and its users are being repeatedly targeted by attackers. Some two months ago, it battled a massive …
Microsoft and FBI disrupt global cybercrime ring
Microsoft, the FBI, Agari, financial services industry leaders FS-ISAC, NACHA, and other industry partners, managed to break up a massive cybercrime ring which was stealing …
Most small businesses can’t restore all data after a cyber attack
Almost one-third of U.S. small businesses surveyed by the Ponemon Institute had a cyber attack in the previous year, and nearly three-quarters of those businesses were not …
Google researcher publishes Windows 0-day exploit
Less than two weeks after Google researcher Tavis Ormandy released information about a new Windows zero-day vulnerability on the Full Disclosure mailing list and asked for …
Is data fragmentation putting businesses at risk?
IT managers believe that fragmentation of corporate data across their IT infrastructure and an emerging “Shadow IT’ network of user devices or consumer cloud …
Featured news
Resources
Don't miss
- Critical CrushFTP vulnerability exploited. Have you been targeted? (CVE-2025-54309)
- How to land your first job in cybersecurity
- World Health Organization CISO on securing global health emergencies
- Calico: Open-source solution for Kubernetes networking, security, and observability
- Cyber turbulence ahead as airlines strap in for a security crisis