Snort 2.9.0 released
Snort is an open source network intrusion prevention system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol …
New encryption offerings from Symantec
Symantec announced the expansion of its encryption solution set with the planned launch of PGP Whole Disk Encryption with support for Intel Anti-Theft Technology, Symantec …
Massive iTunes phishing attack
Apple’s popular iTunes platform has become a major target for hackers looking to steal credit card data from the service’s millions of users. Victims receive a …
Arrests of money mules follow ZeuS gang takedowns
Last week’s arrests and indictments of two gangs (one based in the U.K. and one in the U.S.) that used the ZeuS Trojan to syphon huge amounts of money from private and …
The U.S. leads in malicious URLs
During the first half of 2010, Europe sped through the spam-generating fast-lane, bypassing North and South Americas, and Asia-Pacific to earn the “Top Producer of …
XSS flaws found on three security firms’ websites
A group of white-hat hackers has discovered various XSS vulnerabilities on websites belonging to three well-known security companies, and have reported it to the firms …
Cyber security report reveals Feds’ take on FISMA 2.0
A new study examines Federal CIO and CISO perceptions and usage experiences for CyberScope, the new Federal Information Security Management Act’s (FISMA) online …
QualysGuard integrates with Cyber-Ark’s Privileged Identity Management Suite
Qualys and Cyber-Ark announced QualysGuard integration with Cyber-Ark’s Privileged Identity Management (PIM) Suite. With this integration, customers can store and manage …
CSC acquires Vulnerability Research Labs
CSC has acquired the business of Vulnerability Research Labs (VRL), a privately held cyber threat intelligence firm. The acquisition enables CSC to enhance its cybersecurity …
Plane-tracking phone app is a boon for terrorists?
An application for the iPhone and Android-running devices that allows users to establish the exact location of an airplane by simply pointing it in its direction while it …
The state of compliance
While credit card data breaches remain all too common, a new report from Verizon Business shows that following industry security standards can dramatically reduce such …
Week in review: Stuxnet, WoW phishing and ZeuS gangs smackdown
Here’s an overview of some of last week’s most interesting news, videos, articles and interviews: 60% of organizations suffered $2 million losses for Web 2.0 …
Featured news
Resources
Don't miss
- Salesforce Gainsight compromise: Early findings and customer guidance
- Research shows identity document checks are missing key signals
- How one quick AI check can leak your company’s secrets
- Salesforce investigates new incident echoing Salesloft Drift compromise
- Security gap in Perplexity’s Comet browser exposed users to system-level attacks