Botnet C&C centers move to social networks
In the last year or so, we have witnessed many botnet command and control centers being taken down in organized actions instigated or aided by companies such as Microsoft, …
TrueCrypt 7.0 released
TrueCrypt 7.0 has been released. Among the new features are hardware-accelerated AES, support for devices that use sector sizes other than 512 bytes, ability to configure a …
New zero-day “shortcut worm” vulnerability affects all Windows versions
Microsoft published Security Advisory 2286198 on Friday of last week, confirming the existence of a critical vulnerability in all supported versions of Windows. The new …
iTunes 9.2.1 fixes critical hole
iTunes 9.2.1 comes with improvements and a security fix. A buffer overflow exists in the handling of “itpc:” URLs. Accessing a maliciously crafted …
A holistic approach to managing risk
McAfee unveiled a risk management solution for IT security that combines real-time threat intelligence with global vulnerability scanning across applications, databases and …
Fully itegrated e-mail and web cloud security service
Zscaler announced the worldwide availability of a fully integrated e-mail and web security service. Key features include: Accurate filtering to block spam and phishing Deep …
SOURCE Barcelona 2010 speaker line-up
SOURCE Conference brings computer and IT security professionals and practitioners together in a unique environment to discuss the security industry’s most important …
Splunk 4.1.1 brings 90+ fixes
Splunk provides the ability for users to search, monitor and analyze live streaming IT data as well as terabytes of historical data, all from the same interface. The following …
Identifying suspicious URLs
This video explores online learning approaches for detecting malicious Web sites (those involved in criminal scams) using lexical and host-based features of the associated …
Hacker fingerprints – the future of malware detection?
It has been obvious for a time now that security companies will have to find a new malware detection technique that will complement their heuristic engines searching for …
Skimming devices on gas pumps sending stolen card numbers via Bluetooth
A maintenance worker at a Shell gas station located in Florida was the first one to notice that a gas pump he was checking had been fitted with a credit card skimming device. …
Emerging threats in the end user environment
New social networking technologies, mobile devices and a more flexible and tech-savvy workforce are leading to increasingly complex and diverse end user environments with many …