Reactions from the security community to the Trustworthy Computing Initiative
This week, Microsoft is celebrating 10 years of its Trustworthy Computing Initiative (TwC). One of the most well-known outcomes of Trustworthy Computing is the Microsoft …
10 years of Microsoft’s Trustworthy Computing Initiative
Ten years ago this week, during a time when security problems were threatening trust in software products, Bill Gates sent an email to all Microsoft full-time employees …
Chinese using malware to attack US DoD smart card security
AlienVault found evidence of Chinese-originated attacks against the US government agencies including the US Department of Defense (DoD), which use a new strain of the Sykipot …
Volume and sophistication of attacks to increase
Based on activity levels observed in the second half of 2011, the growing pace, volume and sophistication of attacks suggest consumers, small businesses and corporations will …
Identity intelligence and the complexity of security
An employee’s unauthorized access to client information can leave a firm vulnerable to security breaches and audits. Many companies juggle the administration of …
Secure web gateway protection from Sophos
Virtualization has helped organizations reduce capital and operating costs, while driving greater levels of application availability. It has also yielded benefits in …
Microsoft SharePoint 2010: Deploying Cloud-Based Solutions
Take your Microsoft SharePoint solutions to the cloud and gain scalability and high availability while helping to lower your operational costs. Led by a SharePoint expert, …
FreeBSD 9.0 released
The FreeBSD Release Engineering Team is announce the availability of FreeBSD 9.0 that adds many new features. The release is now available for the amd64, i386, ia64, powerpc, …
Ramnit not actually a Facebook worm
Last week, information surfaced about a new version of Ramnit, which had stolen some Facebook credentials. Most people understood that to mean that there was a new Facebook …
Retailers increasingly considering biometric authentication
More than half of retailers still use passwords for point-of-sale (POS) system login, despite concerns over the sharing and misuse of those passwords, according to …
Rootkit masquerading as Pro Evolution Soccer 2012 keygen
Users who want to play the Pro Evolution Soccer 2012 game free of charge are in danger of getting duped and their computers compromised while looking for game cracks, warns …
Scammy “Pink Facebook” offer
You might be bored with Facebook’s standard blue look and ask yourself why the social network doesn’t allow for a change of color, but please don’t make the …
Featured news
Resources
Don't miss
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)
- GitPhish: Open-source GitHub device code flow security assessment tool
- Healthcare CISOs must secure more than what’s regulated
- Qantas data breach could affect 6 million customers
- Cybersecurity essentials for the future: From hype to what works