Security trends coming in 2010
Websense released its list of security predictions and trends anticipated for 2010. The emerging trends and predictions show an overall blending of security threats across …
Apple updates Java for Mac OS X 10.5 and 10.6
The latest Java updates from Apple deliver improved reliability, security, and compatibility for Java SE 6 and J2SE 5.0. Java for Mac OS X 10.5 Update 6 supersedes all …
Google Public DNS released
Today Google launched their own public Domain Name System (DNS) resolver called Google Public DNS that you can use as an alternative to your current DNS provider. Google …
12 tips for safe online shopping
Approximately ten million Americans have their identity stolen each year according to the Federal Trade Commission (FTC). As more business is conducted online and sensitive …
Feds sued for withholding social network surveillance info
The Electronic Frontier Foundation, an international non-profit organization that is dedicated to the preservation of civil liberties related to the use of the Internet and …
Handing your encryption key to authorities: US vs. UK law
Two years ago, a US federal judge decreed that a criminal defendant can’t be coerced into giving up the encryption key to his encrypted hard drive because that would …
The Zeus botnet strikes again
The Zeus botnet is hitting inboxes worldwide this week. Capitalizing on the public concern over the flu and the recent swine flu outbreak, a spate of malicious emails have …
Security incidents at an all-time high
The Computer Security Institute (CSI) pre-released selected findings from its 2009 Computer Crime and Security Survey. The survey, now in its 14th year, found that average …
Wall Street Journal website vulnerable to SQL injection
A Romanian security researcher that goes by the handle “Unu” has made public his latest conquest. He managed to gain access to databases of the The Wall Street …
Facebook privacy changes
Facebook CEO Mark Zuckerberg addressed Facebook users via an open letter today, and announced a few changes aimed at improving the privacy settings and allow users more …
Security concerns hinder cloud computing adoption
Concerns about the security of cloud computing environments top the list of reasons for firms not being interested in the pay-per-use hosting model of virtual servers, …
Internet worms record rapid global growth
Major security developments in 2009 included Conficker, the most damaging networking worm for years. Conficker spread fast in computers using the Windows XP operating system …
Featured news
Resources
Don't miss
- Hackers love events. Why aren’t more CISOs paying attention?
- Before scaling GenAI, map your LLM usage and risk zones
- SinoTrack GPS vulnerabilities may allow attackers to track, control vehicles
- Why banks’ tech-first approach leaves governance gaps
- MDEAutomator: Open-source endpoint management, incident response in MDE