Cloud streamlines efficiency of identity theft
Working with cloud-based services significantly improves economies of scale – for cybercriminals too, according to Commtouch. Phishers are already benefiting from free …
Tips for healthcare organizations to improve their security profile
Based upon extensive work in both healthcare IT and information security, CDW Healthcare has identified preliminary steps for healthcare organizations focused on improving …
SANS gets ready for Amsterdam
SANS Secure Europe, one of the region’s largest infosec training events is returning to Amsterdam’s Radisson Blu Hotel from 9th-21st May with 2 weeks of technical, …
Apple iOS 4.3 fixes security issues
The iOS 4.3 update contains new features, improvements, security and bug fixes. CoreGraphics Multiple vulnerabilities existed in FreeType, the most serious of which may lead …
Restrictive e-mail policies: Hidden security risks for business
IT departments are fighting a losing battle in seeking to constrain employees’ behavior through policy alone, according to Mimecast. Findings suggest that a new approach …
March Patch Tuesday details
In the video below, Qualys CTO Wolfgang Kandek and Qualys vulnerability labs manager Amol Sarwate discusses this month’s Microsoft Patch Tuesday release.
How can the author of an anonymous e-mail be identified?
When anonymous letters were written by hand, graphologists were called in to identify the likely author. In this day and age when most such mail is sent electronically, it may …
Multiple vulnerabilities in Google Chrome
Multiple vulnerabilities have been reported in Google Chorme, according to Secunia. Some have an unknown impact while others can be exploited by malicious people bypass …
Fraud losses drop on cards, cheques and online banking
New figures show that banking industry initiatives are successfully keeping the fraudsters away from customers’ cards and bank accounts. Fraud losses on UK cards, …
Apple updates Java for Mac OS X 10.5 and 10.6
The latest Java updates from Apple deliver improved reliability, security, and compatibility. Java for Mac OS X 10.5 Update 9 delivers improved compatibility, security, and …
Will IPv6 render blacklisting obsolete?
We are all aware that IP addresses have almost run out. Security experts are debating the pros and cons, but the sad fact is the migration towards IPv6 is inevitable. Now it …
Risks to address when contracting for cloud services
Gartner has identified four risky issues that CIOs and sourcing executives should be aware of when contracting for cloud services. “Cloud service providers will need to …
Featured news
Resources
Don't miss
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
- Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
- A new way to think about zero trust for workloads
- Heisenberg: Open-source software supply chain health check tool
- Securing real-time payments without slowing them down