Week in review: pcAnywhere code leaked, Trustwave revokes “MitM” certificate, and top reasons for IT layoffs in 2011
Here’s an overview of some of last week’s most interesting news, articles and interviews: Compromised DreamHost-hosted websites lead to scams Hundreds of websites …
Romney defeats Gingrich in US spam primaries
Mitt Romney, the former Massachusetts governor who’s leading polls in the race to become the Republican Party’s nominee for the US presidency, is also the favorite …
Active mobile botnet enslaves thousands of Android devices
A trojanized Android application for configuring phone settings has been enslaving the devices of the customers of China’s two largest mobile carriers into a botnet …
Free online privacy tool
Abine released Do Not Track Plus (DNT+), a tool that makes it easy for anyone to see when they’re being tracked online and stop being profiled by social networks, large …
MasterCard and Silver Tail Systems combat online fraud
MasterCard and Silver Tail System announced a relationship that will enable merchants to differentiate fraudsters from legitimate consumers in real-time during the online …
Making Embedded Systems
Embedded systems control many devices in common use today, from digital watches and iPods to traffic lights and the systems controlling nuclear power plants. Since …
Top reasons for IT layoffs in 2011
Based on the data obtained with the help of a data leakage control system, and an in-depth analysis of work time usage by staff, the specialists of Falcongaze analytical …
The evolution of targeted attacks and exploit kits
There’s been a significant growth in cybercrime, via sophisticated targeted attacks and social media scams, as well as a rise in malicious email attachments, despite a …
Apple iWork passwords cracked
ElcomSoft can now recover passwords protecting Apple iWork documents. This makes Distributed Password Recovery the first tool to recover passwords for Numbers, Pages and …
ISO 27001 benefits: How to obtain management support
As with any other project, if you do not ensure enough money and human resources, your ISO 27001 project will fail. Therefore, the only way to get those is to get your …
Cybercriminals tailoring tactics for maximum appeal
GFI Software released its report on the most prevalent threat detections encountered during January. Last month saw malware attacks targeting a wide range of potential …
Web app security scanner Netsparker 2.1 released
Netsparker can crawl, attack and identify vulnerabilities in all custom web applications regardless of the platform and the technology it’s built on, just like an actual …
Featured news
Resources
Don't miss
- Security tooling pitfalls for small teams: Cost, complexity, and low ROI
- BloodHound 8.0 debuts with major upgrades in attack path management
- Back to basics webinar: The ecosystem of CIS Security best practices
- SonicWall firewalls targeted in ransomware attacks, possibly via zero-day
- AIBOMs are the new SBOMs: The missing link in AI risk management