Most federal employees take IT security seriously
Most Federal employees go beyond baseline IT security requirements, according to a new survey by the Government Business Council. While 97 percent of Federal employees are …
Dell to acquire SecureWorks
Dell has signed a definitive agreement to acquire SecureWorks, a provider of information security services. SecureWorks protects information assets, improves compliance and …
Secure your iMac with a lock
MacLocks is making iMac theft prevention possible, following up their successful iPad lock. The all new Maximum Security iMac lock makes it easier than ever to lock down an …
Mobile users more vulnerable to phishing attacks
Trusteer recently gained access to the log files of several web servers that were hosting phishing websites. Analyzing these log files provided visibility into how many users …
Assessing, testing and validating Flash content
In this video, Peleus Uhley, the Platform Security Strategist at Adobe, talks about assessing, testing and validating Flash content. He discusses cross-site scripting, code …
Tips to securely shred unnecessary files
Organizations often hold on to records that are no longer needed. These records take up valuable storage space and cost money that could otherwise be saved. Adhering to a …
Adobe PDF format riddled with exploitable features
Adobe’s PDF format and standard has been known for a while now to be easily exploitable and, thus, rather insecure. In the past, attackers have taken advantage not only …
Week in review: less spam, a new Android Trojan and the dark side of Twitter
Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: The security landscape from 2010 to 2011 Vendor-neutral testing and …
The significant decline of spam
In October Commtouch reported an 18% drop in global spam levels (comparing September and October). This was largely attributed to the closure of Spamit around the end of …
Android Trojan with botnet capabilities found in the wild
A new, more sophisticated Trojan for Android devices has been spotting lurking on third-party Chinese Android app markets – the first ever piece of Android malware that …
WordPress 3.0.4 critical security update
Version 3.0.4 of WordPress is a very important update to apply to your sites as soon as possible because it fixes a core security bug in our HTML sanitation library, called …
GSM cracking is all about knowledge, not money
Since the cracking of GSM encryption back in December 2009 by encryption expert Karsten Nohl, the cost of setting up an operation that includes sniffing out the calls made by …
Featured news
Resources
Don't miss
- Vulnerable firmware for Gigabyte motherboards could allow bootkit installation
- AsyncRAT evolves as ESET tracks its most popular malware forks
- Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech
- Securing vehicles as they become platforms for code and data
- How service providers can turn cybersecurity into a scalable MRR engine