Forensics for advanced threat activity
Damballa announced Failsafe 5.0, a solution that hunts for undetected threats by correlating a variety of observed network behaviors that indicate malware-infected devices …
Watch your smartphone on Black Friday
Credant Technologies announced the results of its most recent survey of the number of wireless devices lost and found at 15 of the busiest shopping malls in America. Nearly …
SAP NetWeaver multiple vulnerabilities
Digital Security Research Group has reported multiple vulnerabilities in SAP NetWeaver, which can be exploited by malicious users to conduct script insertion attacks, …
Trojan masquerading as PDF signed with stolen government certificate
Since the discovery of the Stuxnet worm, and especially after the recent string of certification authority compromises, cyber attackers’ practice of using digital …
Cyber crooks should get tougher sentences, says PCeU chief
Cyber fraudsters and robbers often receive considerably lighter sentences that their real-world counterparts, says Detective Superintendent Charlie McMurdie, the head of …
Study of next-generation firewall deployments
The results of a Ponemon Institute survey show 55 percent of users globally, and 64 percent in the U.S., are leveraging next-generation firewalls to augment their current …
Joomla! security bypass weakness and XSS vulnerability
A weakness and a vulnerability have been reported in Joomla!, which can be exploited by malicious people to bypass certain security restrictions and conduct cross-site …
Security threats to expand in 2012
Attackers are sidestepping automated security technology and are using social engineering and data mining to orchestrate attacks against prominent individuals and their …
Top five tips to avoid bad apps
While reported mobile malware incidents are still relatively low in number, McAfee Labs is seeing significant growth in the mobile malware threat landscape. Due to the fact …
Apple OS X sandbox hole allows bypassing of restrictions
Following Apple’s announcement that all applications submitted for inclusion in the App Store will have to have sandboxing implemented starting from March 1, 2012, …
Hacked Sky News Twitter account falsely reports on Murdoch arrest
Hacking Twitter feeds of popular mainstream media outlets is a perfect way of getting your message across to or create panic among a great number of people. It has also lately …
IBM unveils mobile security service
IBM unveiled its Hosted Mobile Device Security Management service that helps organizations protect against data loss and other risks caused by device theft, unauthorized …