Coverity Security Library released on GitHub
Coverity announced the creation of the Coverity Security Library, an open source project available through GitHub and Maven to help developers easily fix cross-site scripting …
Intel joins SAFECode
The Software Assurance Forum for Excellence in Code (SAFECode), a non-profit organization exclusively dedicated to increasing trust in information and communications …
Open source NAC system PacketFence 3.6 released
PacketFence is a fully supported, trusted, free and open source network access control (NAC) system. Among the features provided by PacketFence, there are: BYOD (Bring Your …
Red Hat Enterprise Linux 6 achieves top security certification
Red Hat Enterprise Linux 6, including the KVM hypervisor, has been awarded the Common Criteria Certification at Evaluation Assurance Level (EAL) 4+ – the highest level …
Malware authors turn to simpler detection evasion techniques
Given the huge amount of malware variants created each year, it is understandable that malware researchers count on automated threat analysis systems to single them out for …
Malicious “Your Photos” email from fake LinkedIn users
If you receive an email seemingly coming from a LinkedIn user, asking you to open an attachment in order to see “your photos” – don’t do it! Opening …
Cloud Security Alliance released SIEM guidance
The Cloud Security Alliance (CSA) released the Security Information and Event Management (SIEM) guidance report as part of its Security as a Service (SecaaS) Implementation …
Service Bus for Windows Server released
Service Bus for Windows Server provides Windows Azure Service Bus messaging capabilities on Windows Server. It enables you to build, test, and run loosely-coupled, …
Privilege Guard 3.6 released
Avecto released Privilege Guard 3.6, which introduces a number of new features, including a challenge/response capability to easily authorize applications for remote users and …
Effective MySQL: Replication Techniques in Depth
Effective MySQL: Replication Techniques in Depth describes what is needed to understand and implement MySQL replication to build scalable solutions. This book includes …
Week in review: Windows 8 security features, weak crypto allowed spoofing emails from Google, PayPal domains
Here’s an overview of some of last week’s most interesting news and articles: Shortened .gov URLs lead to scams The fact that cyber crooks often misuse URL …
Flaw in boarding pass check system puts fliers in danger
Everybody knows by now that airline boarding passes have barcodes that, when decoded, show a series of letters and numbers that “summarize” the main information …