Deconstructing hacktivist operations and tools
Imperva released its September Hacker Intelligence report, which details the latest methods deployed by hackers to execute DDoS attacks by analyzing the technical tools and …
Microsoft offers Fix it for IE zero-day, announces security update
Microsoft has released the Fix it solution for the IE zero-day memory-corruption vulnerability that is currently being exploited in attacks, and has promised a security update …
Darwin’s theory applies to malware
G Data’s new malware report shows a new and unexpected development in malware: the extreme growth of new malicious programs seems to be slowing down. Granted, the …
Dedicated sensor for Wi-Fi network monitoring
Fluke Networks announced a new dedicated sensor for Wi-Fi network monitoring that eliminates the need for Ethernet cabling, and reduces the cost by up to two thirds in …
RSA launches incident response services
RSA introduced RSA Advanced Cyber Defense Services (ACD), a new portfolio of services, including incident response and breach readiness assessment, are designed to assist an …
Passwords Plus for Mac OS X released
DataViz announced the availability of Passwords Plus for Mac OS X, plus updated versions for iOS and Windows. Passwords Plus stores and protects PINs, passwords, and other …
Vendor application security testing program from Veracode
Veracode announced the Vendor Application Security Testing (VAST) program, which provides an independent, automated, and outsourced program to help enterprises reduce the …
Interoperable standard for financial data exchange
The IFX Forum has published version 1.9 of IFX, its open, interoperable standard for financial data exchange. The IFX Forum is an international non-profit industry association …
iPhone buyers, beware of fake UPS notices
In view of the fact that deliveries of the extremely popular iPhone 5 will start on Friday, Websense’s director of security research Patrik Runald has issued a warning …
Google Go programming language used for creating destructive Trojan
When Google introduced its Go programming language in 2009, they surely didn’t hope for it to be used for writing malware but, as these things go, it was a only a matter …
Cyber criminals actively targeting financial institutions, warns FBI
Cyber criminals have been and are actively targeting employees of financial institutions with spam and phishing e-mails, warns the FBI-backed Internet Crime Complaint Center …
Microsoft promises fast fix for IE zero-day as new attacks are discovered
The problem of the remotely-exploitable IE zero-day memory-corruption vulnerability that is being misused in current attacks has reached a critical enough level for Microsoft …
Featured news
Resources
Don't miss
- What makes a security program mature and how to get there faster
- EntraGoat: Vulnerable Microsoft Entra ID infrastructure to simulate identity security misconfigurations
- Win-DDoS: Attackers can turn public domain controllers into DDoS agents
- How Brandolini’s law informs our everyday infosec reality
- From legacy to SaaS: Why complexity is the enemy of enterprise security