Automated defense against industrialized cyber attacks
Imperva announced ThreatRadar, an add-on to Imperva’s Web Application Firewall (WAF) that provides automated, reputation-based defense against large scale industrialized …
Waledac disruption only the beginning, says Microsoft
In the wake of the news regarding Microsoft’s disruption of Waledac botnet’s links between its command and control centers and the infected zombie computers by …
58 percent of software vulnerable to security breaches
Veracode released a “State of Software Security” report detailing vulnerabilities found in software that large organizations rely on for business critical …
Fake Virustotal serves malware
The reputation of VirusTotal, the well-known site that allows you to check if a suspicious file is malicious or not, is bound to be somewhat affected by the emergence of a …
Rugged and secure portable drive
Enova’s X-Wall FX provides the hardware real-time cryptographic capability to your entire SATA portable drive including SSD within a tightly integrated USB 2.0 and SATA …
Introducing SOURCE Conference Boston
SOURCE Boston is a security conference that brings security professionals and business leaders together, sails into the Boston’s Seaport Hotel April 21-23, 2010. The …
Protect every asset in the cloud infrastructure
Lieberman Software announced an enhancement to Enterprise Random Password Manager (ERPM) that now delivers fine-grain management features to protect every asset in the cloud …
Week in review: Twitter phishing, rogue software and Waledac botnet takedown
Here’s an overview of some of last week’s most interesting news and articles: 75% of organizations suffered a cyber attack 42 percent of organizations rate …
Relentlessly annoying banking Trojan
The majority of banking trojans prefers to hide in the deepest recesses of your computer and silently steal your login credentials. But CA’s researchers recently came …
SQL injection attack show-and-tell
SQL injection has, for a long time now, found its way to the top places of the list of favorite attack vectors of cyber criminals. Its popularity is, without a doubt, due to …
Microsoft cripples the Waledac botnet
A few days ago, Microsoft has requested and was granted a temporary restraining order that resulted in the takedown of 273 Internet domains that are believed to belong to …
Mobile workforce shift will cause security headache
A recent iPass report highlights the rising numbers of workers are moving to a truly mobile working environment confirms what many in the IT security industry have suspected …
Featured news
Sponsored
Don't miss
- Most people still rely on memory or pen and paper for password management
- What AI can tell organizations about their M&A risk
- Breaking down the numbers: Cybersecurity funding activity recap
- Applying DevSecOps principles to machine learning workloads
- Overcoming GenAI challenges in healthcare cybersecurity