The need for global cooperation on cyber security
When the Internet was in its teens, it was hard to imagine it evolving as far as it has. Yesterday I was chuckling over an article from 1995 in which the author adamantly …
First certified cloud-based solution for FDCC compliance
Qualys announced its new QualysGuard FDCC module – the first certified cloud-based computing solution for FDCC compliance. The module, validated by the National …
Rapid7 NeXpose now includes Exploit Exposure
Rapid7 announced Exploit Exposure, a new technology in its vulnerability management product, Rapid7 NeXpose. Exploit Exposure provides users with deeper insight into the …
What’s a rogue and why do you need to know?
You may not be familiar with the term rogue software but there’s a very good chance that you or someone you know either has experienced it, or will in the near future. …
Phishers target Blogger users
Users of Google’s Blogger, a free blog publishing tool, are the targets of the latest phishing email campaign: The text of the message couldn’t be simpler, and the …
Widespread data breaches uncovered by FTC probe
The Federal Trade Commission has notified almost 100 organizations that personal information, including sensitive data about customers and/or employees, has been shared from …
Excalibur Conference 2010 call for papers
In autumn 2010, the Excalibur Conference in China, will feature talks but world-renowned security professionals that will address new areas of research. The event will cover …
Warrantless cell phone tracking on the horizon?
There is no doubt about the fact that real time or historical tracking of criminals’ movement via their cell phones can come really handy to law enforcement officers. It …
Rogue software details: Desktop Security 2010
Desktop Security 2010 is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Twitter users targeted by BZPharma phishing attack
The latest attack on Twitter users took the form of the fascinatingly curiosity-raising phrase “Lol. This you??” and it’s variants “Lol. this is …
75% of organizations suffered a cyber attack
A new Symantec study found that 42 percent of organizations rate security their top issue. This isn’t a surprise, considering that 75 percent of organizations …
First 2TB 6Gb/s SAS enterprise drive
Seagate is now shipping its 3.5-inch Constellation ES drive, the industry’s first 2TB enterprise-class drives featuring 6Gb SAS. Designed specifically for multi-drive …
Featured news
Sponsored
Don't miss
- Most people still rely on memory or pen and paper for password management
- What AI can tell organizations about their M&A risk
- Breaking down the numbers: Cybersecurity funding activity recap
- Applying DevSecOps principles to machine learning workloads
- Overcoming GenAI challenges in healthcare cybersecurity