nCircle debuts PureCloud security scanning technology
nCircle announced in collaboration with HITRUST the debut of PureCloud, a security scanning technology, and the integration of PureCloud into the HITRUST CSF Assessment for …
Google to fix Android flaw
Two days ago, a group of German scientists made public the fact that a Google authentication protocol flaw. The flaw makes it possible for malicious individuals to sniff out …
Red Hat Enterprise Linux 6.1 released
Red Hat Enterprise Linux 6.1 is now available. Enhancements provide improvements in system reliability, scalability and performance, coupled with support for upcoming system …
OpenSSL weakness can expose sensitive information
A weakness has been reported in OpenSSL, which can be exploited by malicious people to disclose potentially sensitive information, according to Secunia. The weakness is caused …
VM Explorer 3.5 released
VM Explorer is a management tool that eases management, backup and disaster recovery tasks in your VMware ESX environment. Backups can be stored on ESX, Windows, Linux and …
SCADA flaws talk cancelled due to security fears
Since the advent of the Stuxnet worm, SCADA industrial control systems have been receiving a lot of attention. You would expect that since these systems are those that control …
ElcomSoft exposes information in BlackBerry backups
With BlackBerries occupying approximately 40 per cent of the North American market of business communicators and about 20 per cent of the market worldwide, accessing …
Mac Protector: Fake AV targets Mac OS X users
A little over two weeks have passed since the appearance of MAC Defender, the fake AV solution targeting Mac users. And seeing that the approach had considerable success, it …
Insider threats plague data managers
Financial services organizations struggle with human error, abuse of privileges more than most. Application Security, Unisphere Research, and the International Sybase Users …
Microsoft Web Application Configuration Analyzer 2.0 released
Web Application Configuration Analyzer (WACA) is a tool that scans a server against a set of best practices recommended for pre-production and production servers. The list of …
A guideline for critical information infrastructure governance
ENISA launched a new publication on National Risk Management (NRM) preparedness. The report sets out the essential elements as a guideline for the governance of NRM in …
Stolen credit card numbers advertised via Twitter
You would expect online criminals to want to keep a low profile and restrict their attempts of selling stolen wares to shady online criminal forums, but every once in a while …