McAfee.com filled with vulnerabilities
Discovering that your site is chock full of security vulnerabilities must be embarrassing for any company, but is surely doubly so when you are a company offering to secure …
Lawyers appeal Twitter data handover decision in WikiLeaks case
Not satisfied with the court’s decision that it has to turn over account details of three of its users to the US Department of Justice, three Twitter users have filed a …
The most challenging compliance regulation? HIPAA
From an IT standpoint, the Health Insurance Portability and Accountability Act (HIPAA) is the most challenging regulation to businesses today, according to Ipswitch. HIPAA, …
VPN client suite for Mac OS X
NCP engineering released its centrally managed IPsec VPN client for Mac OS X 10.5 (Intel) and 10.6. Mobile employees using Mac OS X are now able to access the company network …
New ransomware variant in the wild
A new variant of a piece of ransomware seen in the wild late last year has begun targeting users that made the mistake of landing on the site that serves it via drive by …
MySQL.com compromised by SQL injection attack
MySQL.com has been hacked and a part of the database containing member and employee email addresses, usernames and passwords has been published by the hackers on Pastebin.com. …
Lone hacker owns the Comodo certificate compromise
Last week’s revelation that a Comodo affiliate Registration Authority has been compromised and that nine rogue SSL certificates have been issued for popular domains such …
Spotify has been displaying malicious ads
Streaming music service Spotify has been displaying malicious ads to users of their Free version. The ads lead to websites that used the Blackhole Exploit Kit to infect users …
Intellectual capital is the new cybercrime currency
Cybercriminals understand there is greater value in selling a corporations’ proprietary information and trade secrets which have little to no protection making …
Protect the privacy of your Android phone
Privacy Blocker is an Android application that stops other installed applications from gathering your personal information. The software basically pinpoints the type of data …
Most organizations can’t access critical security data
Many enterprises feel that their security processes are failing to meet their potential due to a lack of coordination, benchmarking, and proactive improvement among the …
Metrics and measurements in network and service resilience
Business and governments are all reliant on secure networks, but how do you measure the resilience of these networks? The European Network and Information Security Agency …
Featured news
Resources
Don't miss
- How nations build and defend their cyberspace capabilities
 - Uncovering the risks of unmanaged identities
 - Deepfakes, fraud, and the fight for trust online
 - Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military