Forensic access to encrypted BitLocker, PGP and TrueCrypt containers
ElcomSoft released Elcomsoft Forensic Disk Decryptor, a forensic tool providing access to information stored in disks and volumes encrypted with BitLocker, PGP and TrueCrypt. …
“Facebook 2013 Demo app” leads to phishing
The offer of an app that supposedly allows users to view a new version of Facebook is the newest trick employed by phishers to get their hands on the users’ login …
Will the Sweet Orange exploit kit dethrone Blackhole?
There’s a new exploit kit being offered for sale and it seems to be slowly but surely gaining in popularity. Dubbed Sweet Orange, the kit uses exploits for Java, PDF, IE …
Online reputation management tips
AVG announces twelve tips for individuals to safeguard their reputations while engaging in heightened e-commerce and social media activities during the holidays. …
Cloud exploits and mobile device attacks on the horizon
Although many security experts predict that the most likely data breach threats organizations will face in 2013 include cloud exploits, mobile device attacks and all-out cyber …
Exploits, security threats and hacks will mutate in 2013
Lamar Bailey, Director of Security Research and Development with nCircle, has released his top five security threats to watch out for in 2013. The New Year – and beyond …
88% of corporate databases vulnerable to cybercrime
GreenSQL revealed that 88 percent of all companies participating in its December survey do not protect their databases from both external and internal threats, and almost one …
Compliance auditing with in-depth reporting
Paws Studio is the compliance auditing tool for workstations and servers which enables organizations to produce intelligent compliance reports. It includes pre-defined …
Secure stateless tokenization for enterprises
Voltage Security announced its Stateless Tokenization (SST) technology, a patent-pending data security solution that provides enterprises, merchants and payment processors …
Bogus LinkedIn invitations lead to info-stealer Trojan
Another round of LinkedIn-themed spam is hitting inboxes around the world, warns GFI. The email, sent from a bogus email address, urges the recipient to join the …
Apache malware targeting online banking
Analysis of a malicious Apache module, detected by ESET as Linux/Chapro.A, found that the world’s most widely used web server, Apache, is being used to carry out these …
RSA opens anti-fraud center at Purdue University
RSA, the security division of EMC, announced the opening of a new RSA Anti Fraud Command Center (AFCC) in collaboration with Purdue University. The RSA AFCC is a 24×7 …
Featured news
Resources
Don't miss
- Security tooling pitfalls for small teams: Cost, complexity, and low ROI
- BloodHound 8.0 debuts with major upgrades in attack path management
- Back to basics webinar: The ecosystem of CIS Security best practices
- SonicWall firewalls targeted in ransomware attacks, possibly via zero-day
- AIBOMs are the new SBOMs: The missing link in AI risk management