Protect data by finding forgotten databases
Application Security declared that organizations can no longer afford to guess or assume that they have their database inventory under control. Based on the premise that you …
Practical Malware Analysis
Malware. You know what it is. Perhaps you’ve even fought a malware infection or two. Wouldn’t it be nice if the good guys finally had one really complete guide to …
Web filtering technology with next-generation firewall capabilities
Barracuda Networks announced the integration of the Barracuda NG Firewall and Barracuda Web Security Flex. This solution combines cloud-based Web filtering technology with …
Mozilla wants CAs to stop issuing and revoke MITM certificates
A heated debate has unfolded after Trustwave made public their decision to revoke a subordinate root certificate it issued to a company that allowed it to intercept their …
Open source password manager gets two-factor authentication
Yubico announced a successful implementation of YubiKey two-factor authentication with the free, open source password manager software Password Safe. The joint solution offers …
Horde FTP server hacked, files modified to include backdoor
The developers of the Horde open source software have issued a statement warning its users that a one of their FTP servers was discovered to have been breached and some files …
February Patch Tuesday lighter than expected
It turns out that this February Patch Tuesday is lighter than we had anticipated. Some of the nine bulletins should be less worrisome to IT admins: the Office vulnerability …
Gap in patch priorities vs cybercriminal targets
Internet users are at risk from the rapid growth in software security flaws – specifically end-point vulnerabilities. Businesses should be doing far more to help …
“Free $200 Ebay Gift Card” leads to rogue Facebook app
A message sharing an “event” offering a “Free $200 Ebay Gift Card for first 10,000 Attendants!” has been popping up on Facebook users’ walls in …
Infosec pros maintain job stability
The information security profession offers not only stability but upward mobility, according to the 2012 Career Impact Survey released today by (ISC)2. Only seven percent of …
Twitter turns on HTTPS by default
Twitter has finally taken the plunge and made HTTPS on by default for all users. The option to always use HTTPS was made available to users back in March 2011, but they had to …
Cloud-based security of mobile devices via Active Directory
Centrify announced DirectControl for Mobile, a cloud-based service lets enterprises centrally secure and manage smart phones and tablets using existing Active Directory …
Featured news
Resources
Don't miss
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)
- GitPhish: Open-source GitHub device code flow security assessment tool