Accelerate patching progress in the enterprise
At RSA Conference 2010 Europe last week, Qualys CTO Wolfgang Kandek gave a presentation on how to accelerate the patching progress in the enterprise. It contains example of …
Facebook apps send user information to ad agencies
Some five months ago, news broke that social networks were sending users’ ID numbers and/or names to advertising agencies every time the users click on the ads, by way …
Fake Twitter homepages serving malware
A number of bogus Twitter main pages have been popping up and are offering misdirected users a chance to see naked ladies and to download malicious applications, Sunbelt …
Nuclear site’s operation details found on lost USB stick?
Reports are coming in that an unencrypted USB stick – apparently containing details on the Sellafield nuclear site’s operations – was found by a coach driver …
78% of organizations experienced downtime due to mismanaged encryption
Encryption key and digital certificate inventories are rising, according to a study by Venafi. Poorly managed encryption leads to system downtime, non-compliance and audit …
Adobe to release more secure PDF reader
Adobe is announcing the new Acrobat X Family of Products which includes Adobe Reader X as well as Acrobat X Suite, Acrobat X Pro, and Acrobat X Standard. Reader X is the only …
Fraud losses increase by 20% in the past 12 months
Theft of information and electronic data at global companies has overtaken physical theft for the first time, according to the Kroll Annual Global Fraud Report. The study …
A cyber criminal’s key to vulnerable systems
New, advanced evasion techniques (AET) that can pose a serious threat to existing network security systems worldwide, according to Stonesoft. These AET threats significantly …
ZeuS gang using malicious LinkedIn spam targets Charles Schwab accounts
The recently started LinkedIn spamming campaign that delivers the ZeuS Trojan – or, according to some, the Bugat Trojan – has been tied to a gang that uses the …
Week in review: Cloud security, patching challenges and RSA Conference 2010 news
Week in review: Here’s an overview of some of last week’s most interesting news, interviews, articles, reviews and podcasts: A foolproof drive-by-download blocking …
Government agents following suspects on social networks
The issue of whether or not government or law enforcement agents are or should be allowed to go “undercover” on social networks is not a new one, but thanks to the …
ZeuS developers up the ante with beefed up variant
ZeuS has for a while now been almost a synonym for banking Trojans of every shape and form. Some say that the attention that the information security community has focused on …
Featured news
Resources
Don't miss
- Salesforce Gainsight compromise: Early findings and customer guidance
- Research shows identity document checks are missing key signals
- How one quick AI check can leak your company’s secrets
- Salesforce investigates new incident echoing Salesloft Drift compromise
- Security gap in Perplexity’s Comet browser exposed users to system-level attacks