Identity as a Service platform for cloud service providers
Symplified announced Symplified Structure which enables telcos, cloud service providers, cloud application brokers, and cloud application hosting companies to seamlessly …
Poison Ivy RAT served by compromised Israeli website
The official website of the Israeli Institute for National Security Studies has been compromised and has been found serving a variant of the Poison Ivy remote administration …
Joint attack by banking Trojan and ransomware
The Citadel malware – a banking Trojan that is based on Zeus Trojan’s source code and whose creators have adopted a Software-as-a-Service approach when it comes to …
Fake PayPal payment notification leads to malware
PayPal might have passed the torch of the most phished brand to China’s Taobao.com, but that doesn’t mean that phishers and other scammers have stopped delivering …
Biggest enterprise data recovery myths
Kroll Ontrack announced the top five data recovery myths. From concerns over cost, system complexity and data protection to resource constraints and simple misunderstandings, …
Free, integrated antivirus and firewall solution
Check Point announced ZoneAlarm Free Antivirus + Firewall 2013 – a free Internet security solution that protects consumers against hackers, viruses, spyware, and …
Oracle addresses 0-day “TNS Poison”
Update: Edited to reflect that Oracle has released a configuration workaround, not a patch. This week Oracle released an out-of-band patch for the CVE-2012-1675 vulnerability …
Protection for Android financial applications
Metaforic had extended its world-class software hardening technology to protect financial applications on the Android platform, which face a range of new threats. Using this …
Managed cloud backup from GFI
GFI Software announced the addition of GFI MAX Managed Online Backup to the GFI MAX RemoteManagement managed services platform. The new service enables managed services …
CIOs and Chief Legal Officers need to work together
Chief legal officers (CLOs) consider their enterprises’ CIOs to be important contributors to corporate strategy and policy, but they need more in-depth interaction with …
Flashback botnet is a cash cow
We have all heard about the Flashback malware targeting machines running OS X and enslaving them into a botnet, but not a lot of attention has been given to the ultimate goal …
Bank robbery 2.0: Online banking in the sights
There are very few technologies that have affected our everyday lives as much as the Internet. It has changed the way we communicate in many ways and has revolutionized …
Featured news
Resources
Don't miss
- What makes a security program mature and how to get there faster
- EntraGoat: Vulnerable Microsoft Entra ID infrastructure to simulate identity security misconfigurations
- Win-DDoS: Attackers can turn public domain controllers into DDoS agents
- How Brandolini’s law informs our everyday infosec reality
- From legacy to SaaS: Why complexity is the enemy of enterprise security