Security platform uses virtual machine introspection
CounterTack announced three new solutions available on Event Horizon, a security platform utilizing virtual machine introspection (VMI), to help organizations identify, …
Self-selected PINs aren’t that hard to guess
Four-digit banking PINs are usually randomly assigned by banks after the issuing of credit and debit cards, but there are still some out there that let its customers choose …
Fake RIAA copyright violation notification serves malware
First spotted nearly a week ago, notifications of copyright violation supposedly sent by the Recording Industry Association of America are still hitting inboxes around the …
Apache HTTP Server 2.4 released
Celebrating its 17th anniversary with an all-time record of nearly 400 million Websites powered worldwide, the Apache Software Foundation announced version 2.4 of the Apache …
Microsoft says Google also bypassed IE’s privacy settings
Following the discovery that Google and other online advertising companies are bypassing Safari’s default “no tracking” settings with specific code inserted …
yaSSL offers new open source security tools
yaSSL has made IT-level security tools available for the open source community, ensuring that mature, advanced security tools like Kerberos, wpa_supplicant, and OpenSSH are …
Automated security analytics and protection
Network security teams face the task of protecting networks with disparate tools that are limited, slow and labor intensive. Multi-stage attacks executed by diligent cyber …
Webroot delivers endpoint protection
The security landscape has changed and traditional signature-based software can’t keep up. A recent study of IT decision makers found an overwhelming 95 per cent …
Malware surpassed 75 million samples in 2011
McAfee released its latest threats report, revealing that malware surpassed the company’s estimate of 75 million unique malware samples last year. Although the release …
New solution and certification addresses the BYOD challenge
Aruba Networks introduced ClearPass, an access management system for the secure provisioning of mobile devices on any enterprise network. It’s designed to enable IT …
Mozilla asks CAs in its root program to revoke all MitM certificates
Following the big brouhaha raised by Trustwave’s acknowledgement that it has revoked a “MitM” subordinate root certificate it issued to a business for its …
Multi-layered cloud security for banks
ActivIdentity announced integrated fraud detection service and authentication capabilities for its 4TRESS Authentication Appliance. The all-in-one platform and cloud-based …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous