85% of US organizations hit by one or more data breaches within the last 12 months
PGP Corporation announced the results from The Ponemon Institute’s fourth annual study on encryption usage in the enterprise – The 2009 Annual Study: U.S. …
Trend Micro’s protection for virtual machines
Trend Micro is expanding its virtualization security portfolio with a content security solution to protect VMware ESX/ESXi environments. Core Protection for Virtual Machines …
Firewall management app turns firewalls back into network security devices
Pressures to keep network traffic flowing through firewalls combined with fear and anxiety over causing interruptions to business processes has created a situation where …
Criminals use enterprise strategies to conduct attacks
Cisco released their 2009 Midyear Security Report, which shows that Internet criminals are increasingly operating like successful businesses, borrowing some of the best …
Microsoft releases 6 security updates
Another Patch Tuesday and Microsoft comes out with security updates for ActiveX, DirectX, ISA Server 2006, Office Publisher, Virtual PC, Virtual Server and Windows. Two of the …
Cyberduck 3.2.1 released
Cyberduck, the FTP, SFTP, WebDAV, cloud files and Amazon S3 browser for Mac OS X, has reached version 3.2.1. The changes in the release include: Create placeholder objects for …
Video: June 2009 threat webscape
June was a huge month for malicious email campaigns. There was a big rise in the volume of malicious messages sent, and many companies were hit by spear phishing campaigns. …
SmartWorkflow: New security management software blade
Check Point announced SmartWorkflow, a new security management software blade that provides customers the option of extending their security infrastructure with policy change …
New book: “Web 2.0 Architectures”
Web 2.0 is more pervasive than ever, but business analysts and technologists are still struggling to comprehend what it can offer them. So what exactly is it–a marketing …
New Trojan variants evade major anti-virus engines
Millions of e-mail viruses bypassed major anti-virus engines during the second half of the second quarter, according to the Q2 2009 Internet Threats Trend Report by Commtouch. …
Spam now represents 90 percent of inbound email
Marshal8e6 released its bi-annual TRACElabs report detailing the latest spam and exploit levels. From January to June 2009, they observed a staggering 60 percent increase in …
Vulnerability in Microsoft Office Web Components
Microsoft is investigating a vulnerability in Microsoft Office Web Components. An attacker who successfully exploited this vulnerability could gain the same user rights as the …
Featured news
Sponsored
Don't miss
- Organizations struggle to defend against ransomware
- Critical Git vulnerability allows RCE when cloning repositories with submodules (CVE-2024-32002)
- Google fixes third exploited Chrome zero-day in a week (CVE-2024-4947)
- Is an open-source AI vulnerability next?
- OWASP dep-scan: Open-source security and risk audit tool