Theory of Computation
Offering an accessible approach to the topic, Theory of Computation focuses on the metatheory of computing and the theoretical boundaries between what various computational …
Week in review: Sizing up botnets, Conficker still alive and kicking, and a new exploit kit spotted in the wild
Here’s an overview of some of last week’s most interesting news, podcasts and articles: What’s in your daily slice of spam? Bitdefender decided to look at …
Walmart gift card scam targets smartphone users
Online survey scams are most often propagated through social network and sharing websites, but occasionally users are “assaulted” directly through their …
Microsoft to release seven bulletins, three critical
The Microsoft Security Bulletin Advance Notification for May 2012 contains 7 bulletins: three rated “critical” and the rest “important.” Just when most …
A new class of CISO is coming
A new IBM study reveals a clear evolution in information security organizations and their leaders with 25 percent of security chiefs surveyed shifting from a technology focus …
1,000+ WordPress sites compromised through automatic update feature
More than 1,000 WordPress blogs have been modified to redirect visitors to sites serving malware, affiliate and pay-per-click redirectors, and low quality PPC search result …
Microsoft names source of RDP code leak
Microsoft confirmed that, as speculated months ago, the RDP PoC exploit was sourced from China. It was apparent that the exploit originated in the West as researchers noticed …
New hacking group hits government websites, leaks stolen data
A hacker group that named itself “The Unknowns” has recently boasted on Pastebin of having compromised a number of government, business and educational websites, …
Top 10 business logic attack vectors
Application business logic flaws are unique to each custom application, potentially very damaging, and difficult to test. Attackers exploit business logic by using deductive …
Comprehensive email threat protection from GFI Software
In order to help SMBs in the fight against email-borne threats, GFI Software today announced the availability of GFI MailEssentials 2012 UnifiedProtection. The solution …
NetIQ minimizes the risk of unauthorized access
Organizations struggle with managing and reporting on end user access and entitlements to meet monthly or quarterly reporting audit cycles and protect corporate information. …
The difficulties in sizing up botnets
The main metric with which security researchers identify how effective and disruptive specific botnets are is the number of computers they consists of. Estimating their size …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware