FBI put backdoors in OpenBSD IPSEC stack?
Some serious allegations have been raised yesterday as Theo de Raadt, founder and leader of the OpenBSD and OpenSSH projects, has made public a private e-mail he received from …
Insiders are most often responsible for data loss
IT managers see insider threat as the biggest danger when it came to data loss within corporate networks (54 percent), according to a survey by Imperva. Far fewer respondents …
Database breach that could endanger lives
A database breach that could result in more than just identity theft is the result of a compromise of the online database of the Mesa County Sheriff’s Department …
Microsoft November Patch Tuesday bottom line
In the video below, Qualys CTO Wolfgang Kandek and Qualys vulnerability labs manager Amol Sarwate discusses this month’s Microsoft Patch Tuesday release. To learn more …
Lack of awareness for PCI DSS 2.0
New research by LogLogic has indicated that 13.8 percent of respondents are completely unaware of the new version and 15.5 percent confirm they are only partially aware of it. …
Microsoft patches record 40 vulnerabilities
Today Microsoft released 17 security bulletins which address 40 vulnerabilities affecting Microsoft Office, Windows, Internet Explorer, SharePoint Server and Exchange. This …
New Trojan hijacks shortcuts to ensure its execution
A new information-stealing Trojan that seems to be Chinese in origin has been detected by Avira’ researchers. It is designed to steal usernames and passwords associated …
Fake Hallmark greeting card carries malware
A spam campaign consisting of e-mails posing as Hallmark Christmas cards and containing a malicious attachment has been detected by MX Lab researchers: Coming from a spoofed …
Julian Assange granted bail
WikiLeaks founder and director Julian Assange has been granted bail and will likely be freed in the next few days – as soon as the £240,000 in security are raised …
Hacktivism and social engineering emerge as top threats
Hacktivism and more profit-oriented malware, social engineering and malicious codes with the ability to adapt to avoid detection will be the main threats in the coming year, …
Top wireless security trends for 2011
Today’s security needs are different than they were a decade ago. People are ‘connected’ thanks to mobile devices so they can stay linked to their security …
Smart grid cyber security in 2011: Untenable meets intractable
In the presentation below, you can listen to Andy Bochman, the Energy Security Lead at IBM, looking back and looking forward on smart grid cyber security. Andy takes a look at …
Featured news
Resources
Don't miss
- A new way to think about zero trust for workloads
- Heisenberg: Open-source software supply chain health check tool
- Securing real-time payments without slowing them down
- Unpatched Windows vulnerability continues to be exploited by APTs (CVE-2025-9491)
- CISA and partners take action as Microsoft Exchange security risks mount