How can independent media and human rights sites defend themselves from DDoS attacks?
Thanks to the attacks executed by hacktivist group Anonymous against sites of companies that have (in their eyes) wronged WikiLeaks, the DDoS attack has once again become a …
Web-based stealth attacks on network security will dominate 2011
Viruses will become more subtle and even harder to detect in 2011, and the primary line of attack will continue to be via the internet, according to Redscan. Malware is now …
Gawker’s future security plans revealed
An internal memo sent to the Gawker staff by Thomas Plunkett, Gawker Media CTO, has revealed further details about last week’s massive breach that resulted in the …
Database of routers’ embedded private SSL keys published
The recent publishing of a database containing over 2,000 private SSL keys hard-coded into various routers – with their corresponding public certificates and …
110,000 credit card records stolen in NY tour company web server breach
The web server of CitySights NY – a company that organizes tours around New York on double-decker buses – has been breached and names, addresses, e-mail addresses, …
Virus yearbook 2010: Mariposa, Stuxnet and MSNWorm most noteworthy
PandaLabs is closing the year with a look at some of the unique and noteworthy viruses that have appeared over the last twelve months. The list of viruses is vast and varied, …
The world of mobile security fears and escalating compliance
2010 was another year of living dangerously. Companies dealt with huge increases in malware threats, growing mobile security concerns about consumer devices such as iPads, and …
Using social networks to profile, find and own your victims
In this video from DojoCon 2010, Dave Marcus, the Director of Security Research at McAfee Labs, illustrates the dangers of doing unintelligent things online. Dave shows you …
Cisco AnyConnect: Secure network connectivity for Apple iOS
Cisco AnyConnect Secure Mobility Solution, available from the App Store, offers highly secure network connectivity from any Apple iOS 4.1 device, improving the productivity of …
Experimental botnet reveals long sought answers
Is there a better way of analyzing the ins and outs of a botnet than making one yourself? The answer to that question was negative for ESET’s researcher Pierre-Marc …
Upsurge of attacks aimed at Facebook, iPad and smartphones
If you thought 2010 was challenging, just wait for 2011. Below are our top five 2011 security predictions for the coming year from Websense: The Stuxnet sequels are coming, …
Free security tool detects vulnerable and outdated software
Secunia released version 2.0 of their Personal Software Inspector (PSI), a popular free security tool for home users that protects their personal and financial information …
Featured news
Resources
Don't miss
- Windows 10: How to get security updates for free until 2026
- XBOW’s AI reached the top ranks on HackerOne, and now it has $75M to scale up
- Why the SOC needs its “Moneyball” moment
- From posture to prioritization: The shift toward unified runtime platforms
- Why should companies or organizations convert to FIDO security keys?