Secunia joins the Information Security Forum
Secunia has become a member of the Information Security Forum (ISF), an independent authority on best practice in the field of information risk management. Secunia thereby …
Data breach mistakes feared more than attackers
Seventy percent of compliance professionals feel that their organizations are well or very well prepared to fend off malicious hacker attacks, however, their confidence wanes …
Facebook users spammed through Events feature
Facebook scammers are sure to take advantage of every feature that the social network offers and that can be exploited to propagate their scams. The latest one employes the …
Top cybercrime weapon: Web exploit toolkits
HP identified a significant increase in the volume of organized cybercrime targeting data centers and networks, which can lead to financial and data loss. While there were …
Massive Epsilon breach affects JPMorgan Chase, Capital One, US Bank and others
Third-party firms that handle e-mail marketing for big companies and corporations have lately become a very desirable target for attackers, and the onslaught continues. The …
Automated security analysis
Security would be easy if it wasn’t for all the changes, as any IT manager will tell you. Other sectors of IT, such as CRM or ERP, can continue to function efficiently …
EMC acquires NetWitness
EMC has acquired NetWitness, a privately-held provider of network security analysis solutions. NetWitness’ technologies provide network visibility, enabling security …
“Hey, I just made a photoshop of you” Facebook scam
A new Facebook scam that is spreading via Facebook Chat messages is luring people in with promises of a Photoshopped image of themselves. “hey, i just made a photoshop …
The execution of the RSA hack
More than two weeks have passed since the high profile RSA hack, and the company has finally decided to share some of the details regarding the attack. The question that is …
Webroot Mobile Security for Android released
Webroot released Mobile Security for Android which protects users as they browse, text, and download apps on Android devices. A basic version, offering more limited features, …
Multiple vulnerabilities in IBM Tivoli Directory Server
Multiple vulnerabilities have been reported in IBM Tivoli Directory Server, which can be exploited by malicious users to disclose sensitive information and by malicious people …
Week in review: New cybercrime currency, massive SQL injection attack and Facebook battling scammers
Here’s an overview of some of last week’s most interesting news, videoas and articles: Intellectual capital is the new cybercrime currency Cybercriminals …