Cloud Controls Matrix 1.1 released
The Cloud Security Alliance (CSA) launched revision 1.1 of the CCM Security Controls Matrix, available for free here. The Cloud Security Alliance Cloud Controls Matrix (CCM), …
Bradley Manning offered plea bargain
WikiLeaks’ founder Julian Assange has been released a few minutes before 6 pm (GTM) on Tuesday, after the High Court in London confirmed the decision that he is to be …
NSA considers its networks compromised
Debora Plunkett, head of the NSA’s Information Assurance Directorate, has confirmed what many security experts suspected to be true: no computer network can be …
Dell, AMD executives accused of selling confidential information
Market research companies usually pay experts from various industries to give their opinion and provide information about future trends in those industries, and they sell that …
New Facebook feature raises privacy concerns
Facebook users should keep up-to-date with their privacy settings as Facebook announces its latest controversial feature. The social network is launching automated photo …
Companies lack confidence in the effectiveness of controls
A significant number of Global 1000 companies still lack the proper internal controls over, and visibility into, employee access to sensitive applications and data, according …
Performance concerns make 25% of users turn off AV
More than 60 percent of respondents have tried multiple anti-virus products over the course of a year, according to Avira. In addition, 25 percent of the users admitted to …
Tracking protection lists for Internet Explorer 9
Microsoft recently announced that IE9 will enable users to import independently curated lists of third party domains, which can be blocked or allowed access to a user’s …
Emergence of blended malware attacks lead concern for 2011
CoreTrace released their top security predictions for 2011. “The major theme in for 2011 will be evolution. The evolution of attacks like Stuxnet, the evolution of new …
Ohio State University database hacked
A database containing Social Security numbers, addresses and dates of birth of everyone who’s ever had an Ohio State University e-mail address (@osu.edu) has been …
Mozilla expands its bug bounty program
Back in 2004, the Mozilla Foundation instituted a bug bounty program that rewarded users who reported critical security vulnerabilities on the Foundation’s software with …
Twitter spam campaign leads to computer-hijacking rogue AV
Malicious shortened goo.gl links and compromised accounts are once again used to lure users to pages that will ultimately harm their computer. A message saying “a very …
Featured news
Resources
Don't miss
- Vulnerable firmware for Gigabyte motherboards could allow bootkit installation
- AsyncRAT evolves as ESET tracks its most popular malware forks
- Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech
- Securing vehicles as they become platforms for code and data
- How service providers can turn cybersecurity into a scalable MRR engine