Most organizations can’t access critical security data
Many enterprises feel that their security processes are failing to meet their potential due to a lack of coordination, benchmarking, and proactive improvement among the …
Metrics and measurements in network and service resilience
Business and governments are all reliant on secure networks, but how do you measure the resilience of these networks? The European Network and Information Security Agency …
New Unified Threat Management gateway from Netgear
Netgear introduced the ProSecure UTM150 – a Unified Threat Management (UTM) gateway for businesses with around 150 users. The new UTM150 delivers enhanced graphical …
Week in review: SCADA attack code, Play.com breach and Comodo’s rogue SSL certificates
Here’s an overview of some of last week’s most interesting news, articles, interviews, videos and podcasts: Google blames China for Gmail service disruptions It …
Rustock’s demise linked to Harnig botnet switch off
Late last week, the Rustock botnet was downed by Microsoft and the US Marshals Service after they received permission from the US District Court for the Western District of …
WoW phishing email threatens with account termination
World of Warcraft players are often targeted by phishers whose goal is to get the login credentials to as many accounts possible and bleed them dry. A recently detected one …
Cyber attacks on US federal networks on the rise
The number of cyber attacks against federal government systems and networks has increased nearly 40 percent, says in the annual report on federal cybersecurity efforts …
Randomization of code and binaries for evading AV solutions
An interesting detection evasion technique by a site that serves fake AV has recently been spotted by a Zscaler researcher. The site’s source code has been randomized so …
How to wipe personal information off your mobile phone
People are unsuspectingly selling their personal information to complete strangers as a new report from CPP finds half (54%) of second hand mobile phones contain extensive …
Plagiarism detection tool
SAFE Corporation announced the release of DocMatch, a new tool for comparing all kinds of documents to find plagiarism. DocMatch compares thousands of document files in …
Infosecurity Europe 2011: New attack vectors change the landscape
The cybercrime landscape is changing with the overall cost to the UK economy estimated at £27bn per year, by a recent report by the Office of Cyber Security & …
TripAdvisor member database breached, part of it stolen
Just days after Play.com notified its customers of a breach that resulted in their email addresses being compromised and some of its users being targeted with malicious …
Featured news
Resources
Don't miss
- Black Friday 2025 cybersecurity deals to explore
- Quantum encryption is pushing satellite hardware to its limits
- cnspec: Open-source, cloud-native security and policy project
- The privacy tension driving the medical data shift nobody wants to talk about
- Salesforce Gainsight compromise: Early findings and customer guidance