You can count on IT failures
A worrying 60 per cent of respondents surveyed by City Lifeline at this year’s IP Expo have lost access to the company’s IT system following an unexpected …
Barracuda Link Balancer XSS vulnerabilities
Two vulnerabilities have been reported in Barracuda Link Balancer, which can be exploited by malicious people to conduct cross-site scripting attacks, according to Secunia. …
GFI Software cloud-based anti-malware and anti-spam email security
GFI Software announced that GFI MailEssentials Complete Online, a cloud-based anti-malware and anti-spam email security solution, is now available to small and medium …
Week in review: Study of hacker forums, creating effective CAPTCHAs, and trust relocated for yet another CA
Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: Irresponsible IT disposal methods Although data security is the …
Hacker’s pay-walled site hacked by vengeful hackers
A hacker’s pay-walled site on which he offers administrative access to a number of military, education and government websites for sale, has been hacked by a rival …
Malaysian CA issues 22 weak certs, gets its certificate revoked
Microsoft, Mozilla and Google have announced that they are revoking trust in Malaysia-based DigiCert Sdn. Bhd., an intermediate certificate authority authorized by well-known …
Mobile screen-spy software recreates passwords
When one types text messages, emails and login credentials on one’s virtual iPhone or Android keyboard, larger bubbles containing each character pop up for a second …
Latest spam trends and predictions for the end of the year
As the percentage of fraudulent emails received by users in the third quarter of 2011 has risen sharply and they represented 2 percent of all received spam emails, Kaspersky …
Focusing on new technologies instead of security threats
In the rush to utilize new technologies and move into the increasingly borderless world of cloud computing, mobile devices and social media, a growing gap is developing …
Most firms don’t coordinate security planning
Despite the potentially crippling impact of security events on corporate performance, many executives report that their security function is not well coordinated with …
New analytics advance IBM security intelligence portfolio
IBM is extending its proven security services portfolio to include enhanced analytic tools and services to provide deeper, real-time analysis of advance threats. By detecting …
IT Operations Analyzer gets expanded monitoring capabilities
Hitachi announced a new version of its IT Operations Analyzer, an integrated availability and performance monitoring tool that can help reduce complexity, streamline …
Featured news
Resources
Don't miss
- The breaches everyone gets hit by (and how to stop them)
- Black Friday 2025 cybersecurity deals to explore
- Quantum encryption is pushing satellite hardware to its limits
- cnspec: Open-source, cloud-native security and policy project
- The privacy tension driving the medical data shift nobody wants to talk about