7 critical questions to ask before developing a social media policy
Social media disrupts the long-standing rules of business in many ways, but crafting a social media policy is premature unless the designers of the policy answer seven …
Immunet 3.0 introduces custom anti-malware signatures
Sourcefire released Immunet 3.0 which enables users to create custom anti-malware signatures for more accurate protection against targeted attacks and offers a Cloud Recall …
Network situational awareness and retro analysis
Trisul is a Linux based application that passively listens to network traffic and tracks a number of traffic metrics across all layers. It correlates these traffic metrics …
Unregulated mobile app markets are a godsend to malware developers
It’s basic economics – as the number of sold smartphones continues to rise worldwide, so will the number of threats targeting the users of these devices. One of …
Ruby on Rails CSRF protection bypass vulnerability
There is a vulnerability in Ruby on Rails which could allow an attacker to circumvent the CSRF protection provided. The issue affects versions 2.1.0 and above and has been …
List of top e-threats points to computer use trends
BitDefender issued its monthly top 10 list of e-threats, which offers some insight into security and computer use trends. The list (for January) is as follows: 1. …
1 in 3 EU Internet users infected by malware
The EU has been at the forefront in leveraging IT advancements. The region has a high Internet penetration rate and over two-thirds of the population uses Internet. However, …
Facebook survey scam toolkit lowers entry bar for scammers
If you have been wondering about the recent proliferation of survey scams on Facebook and thinking to yourself how is it possible that so many people to know how to develop …
Say “I love you” with the Magic Blue Pill!
It is, after all, the season where we express to our loved ones just how much we care about, appreciate, and truly love them. Since the start of the month Websense Security …
Protected health information breach analysis
Redspin released an analysis of all protected health information breaches publicly recorded between August 2009 and the end of 2010, as per the interim final breach …
Stalker targets Zuckerberg through Facebook
Facebook wouldn’t be so popular if it wasn’t so useful, easy to use and fun, but as with everything else in this world, there are downsides to its use – most …
Injection attacks tutorial
This episode of the OWASP appsec tutorial series describes the #1 attack on the OWASP top 10 – injection attacks. The video illustrates SQL injection, discusses other …