Cisco patches DoS flaws in IOS
Cisco has released a bundle of security updates for the IOS (the software used on Cisco Systems routers and current network switches) and the Unified Communications Manager …
Majority of U.S. federal domain names still don’t use DNSSEC
The majority of Federal agency run .gov domains are not signing their DNS with DNSSEC despite a December 2009 Federal deadline for adoption, according to an IID report. DNSSEC …
Lack of security measures still hinder cloud computing adoption
Demand for cloud computing systems clearly exists. However, better security, like multi-factor authentication and encryption, are going to be required if cloud computing …
Network access control system PacketFence 1.9.1 released
PacketFence is a free and open source network access control (NAC) system. It can be used to effectively secure networks – from small to very large heterogeneous …
Microsoft offers free AV to small businesses
In a well-calculated but also very positive move, Microsoft has announced that – beginning in early October – it will be offering its Microsoft Security Essentials …
No sexually explicit content in the office, please!
Symantec announced the publication of its September 2010 MessageLabs Intelligence Report, and the analysis reveals that 35 percent of remote and office-based workers who use …
All-in-one Wi-Fi cracking solution
ElcomSoft upgraded its Wireless Security Auditor and made it an all-in-one wireless cracking solution. It can automatically locate wireless networks, intercept data packets, …
The cookie that won’t go away
A proof-of-concept JavaScript API that manufactures persistent cookies and stores them in several types of storage mechanisms has been developed by security hacker Samy …
Software security testing – interest is high, security is low
In the past six months alone there have been multiple new zero-day vulnerabilities reported in Microsoft Windows and widely covered uneasiness about the security of mobile …
Theories about Stuxnet’s goal and authors abound
The quality of its code, the stolen certificates used to digitally sign it, the specifically targeted configuration, the four 0-day Windows vulnerabilities it exploits to …
Breakdown of security weaknesses by industry and organization size
WhiteHat Security released the tenth installment of its Security Website Security Statistics Report, providing a first-time breakdown of the state of website security by …
Trojan stealing private key certificates
As you may have already noticed, malware peddlers have realized that their wares have a greater chance of being loaded by the targeted system if they are digitally signed. The …