HTC Android devices allow almost any app access to private data
It’s bad news all around for users of various HTC Android smartphones, as the private data collected by the logging tools recently introduced by the company is also …
Serious disconnect between security perceptions and reality
There’s a serious disconnect between security perceptions and reality among IT Enterprise security managers, according to McAfee. The 2011 Data Center Security Survey …
Facebook now protects users from malicious links
Facebook and Websense announced a technology integration partnership that helps to protect Facebook users from links that lead to malware and malicious sites. Starting today, …
Key issues facing SaaS industry
More than 95 percent of organizations expect to maintain or increase their investments in software as a service (SaaS) and more than one-third have migration projects under …
Symantec IM Manager multiple vulnerabilities
Multiple vulnerabilities have been reported in Symantec IM Manager, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to …
Week in review: Mysql.com hack, QR codes leading to malware and Facebook fixes post-logout tracking cookie
Here’s an overview of some of last week’s most interesting news, interviews, podcasts and articles: Facebook changes raise serious security concerns The last few …
QR codes used to infect Android users with malware
Most people already know what QR codes are: a new type of “barcode” that can be used for a variety of purposes – tracking, ticketing, labeling of products, …
Microsoft security solutions say Chrome is malware
Among the questions and comments on the Google Chrome support forums this morning are several complaints about Microsoft Security Essentials detecting Chrome as a Zbot variant …
XenServer 6 released
Citrix Systems released XenServer 6. As a key component of the Citrix cloud computing and virtualisation strategy, XenServer 6 brings new optimizations and improved …
Nearly 5 million military health care files stolen
Sensitive data about nearly 5 million patients has been compromised following the theft of backup tapes from an electronic healthcare app used in the military health system, …
Critical vulnerabilities triple in 2011
Adoption of mobile devices such as smartphones and tablets in the enterprise, including the “Bring Your Own Device” approach, which allows personal devices to …
Smartphone users choose convenience over security
In a revealing survey of smartphone and tablet users, the majority polled admit to not password protecting their mobile devices despite keeping them logged in to sensitive …
Featured news
Resources
Don't miss
- Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
 - How nations build and defend their cyberspace capabilities
 - Uncovering the risks of unmanaged identities
 - Deepfakes, fraud, and the fight for trust online
 - Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI