Reliance on passwords inhibits online business
A new study by the Ponemon Institute takes a deep dive into consumer perceptions around how organizations are securing their access, and what they would consider to be the …
Qualys and FireMon enable real-time network risk visibility
Qualys and FireMon announced the integration of QualysGuard Vulnerability Management (VM) and FireMon Security Manager with Risk Analyzer in FireMon’s upcoming 7.0 …
Week in review: WordPress sites under attack, Android Trojan downloaded by millions, pass-thought s instead of passwords
Here’s an overview of some of last week’s most interesting news, videos and articles: Real-world test of 21 antivirus products AV-Comparatives have released …
New Android Trojan downloaded from Google Play by millions
Millions of Android users have been tricked into downloading a new Trojan masquerading a slew or legitimate apps directly from Google Play, warns Lookout researcher Marc …
DLP suite for companies with limited IT support resources
Safetica Technologies has launched Safetica 5, the newest version of its Data Leak Protection/monitoring suite, which prevents “human factor” issues that can lead …
Sony Pictures LulzSec hacker sentenced
25-year-old LulzSec hacker Cody Kretsinger (aka “recursion”) has been sentenced to spend one year in prison for his involvement in the Sony Pictures Entertainment …
Research reveals damage that privacy breaches can cause
A global study of consumer attitudes towards company stewardship of personal data conducted by the Economist Intelligence Unit shows that data breaches can cause major damage …
Cloud-based email threat protection from Dell
Dell announced SonicWALL Hosted Email Security 2.0, a cloud-based service providing multi-layered email threat protection backed by 24/7 online and phone support. Dell Email …
Unlocking MS Office 2007/2010 documents
Cloud-based password unlocking service Password-Find introduced a new decrypting algorithm that unlocks half of Microsoft Office 2007/2010 Word, Excel, and PowerPoint …
Widely used routers easy to hack even by remote attackers
Security researchers from Independent Security Evaluators have tested thirteen widely used small office/home office routers and wireless access points, and have discovered …
Microsoft rolls out optional two-step authentication
Microsoft has announced that it will be upgrading the Microsoft account and that this upgrade will include an optional two-step verification feature. “More than a year …
Encrypted e-mail service from Silent Circle
Silent Circle announced the availability of the company’s new Silent Mail e-mail encryption service. Silent Mail addresses longstanding problems with e-mail encryption: …
Featured news
Resources
Don't miss
- Maximum severity Cisco ISE vulnerabilities exploited by attackers
- Phishing campaign targets U.S. Department of Education’s G5 portal
- Cervantes: Open-source, collaborative platform for pentesters and red teams
- Phishing simulations: What works and what doesn’t
- Ports are getting smarter and more hackable