73,000 malware strains created daily in 2011
The number of threats in circulation has risen in comparison to last year. In the first three months of 2011, PandaLabs identified an average of 73,000 new malware strains, …
Securing your network from malware
One of the most significant threats to the security of your network, and the leading cause of data loss, is malware. Whether that malware comes in the form of a worm probing …
Etsy privacy changes leave a lot to be desired
The Internet was all abuzz yesterday about Etsy’s privacy snafu that made its buyer’s full names and purchase histories available for everyone to see. Anyone who …
The growth of cryptography
It’s not every day that Euclid appears in public with “Alice and Bob,” but in a lecture spanning a few thousand years, Ronald Rivest, a member of MIT’s …
Twitter gives user always-on HTTPS option
Little by little, Twitter is heading towards a full HTTPS experience for its users by adding a user setting that, when selected, makes all the activities on your Twitter …
LotusCMS multiple vulnerabilities
A weakness and multiple vulnerabilities have been discovered in LotusCMS, which can be exploited by malicious users to disclose sensitive information and compromise a …
How antivirus and antispyware help keep malware at bay
When it comes to creating Internet security threats, malware writers are masters of disguise and manipulation. They are constantly evolving their tactics to find new ways to …
Health Net suffers massive data breach
Health Net is conducting an investigation into several server drives that are unaccounted for from its data center operation located in Rancho Cordova, Calif. This …
Etsy privacy blunder makes buyers’ purchases public
Etsy, the popular online market for small scale artisans and crafters, might be on the right track for a future privacy lawsuit following last week’s unveiling of its …
Splunk 4.2 released
Splunk provides the ability for users to search, monitor and analyze live streaming IT data as well as terabytes of historical data, all from the same interface. Splunk 4.2 …
Former NSA and CIA Director advocates cyber threat transparency
The former NSA and CIA Director Gen. Michael Hayden could possibly be the last person you would expect to be advocating government transparency. However, his commentary in the …
Complexity as the leading security issue
Security complexity is the number one obstacle that organizations face today. Research from Check Point and the Ponemon Institute shows organizations struggle with a growing …