Week in review: Aurora prevention, RSA Conference, and Mariposa botnet takedown
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Severe IE vulnerability threatens Windows XP users News of a …
Security pros doubt their network-based security
Brocade’s “man-on-the-street” survey at this week’s RSA conference in San Francisco, revealed that 47 percent of respondents believe their network …
Photos: RSA Conference 2010 Expo, part 5
Here’s a glance at the RSA Conference 2009 expo floor. The featured companies are: Entrust, SmartSwipe, Lumension, M86 Security, BlackBerry and Blockmaster.
An alternative to a web application firewall
XyberSecure presented XyberShield, a web application security service and real-time website threat identification and determent solution. Using its proprietary behavioral …
Is there a solution to the ZeuS problem?
Zeus Trojan has for a while now become almost a synonym for banking malware. Its sneakiness and the ability of its makers to constantly change and adapt it would be admirable, …
Mac AV solution with “panic button”
“Macs are safer than PCs but that doesn’t necessarily mean that they’re more secure. Many of today’s threats are browser based and Mac users are …
Malicious files with fake digital signatures
Signing malicious files with fake signatures that at first glance seem authentic is one of the new methods used by malware writers to add an air of legitimacy to them and …
Email encryption service with virtualization support
Zix Corporation announced the next generation of the company’s Email Encryption Service. ZixGateway 4.0 is the latest generation of the company’s directory driven, …
Photos: RSA Conference 2010 Expo, part 4
Here’s a glance at the RSA Conference 2009 expo floor. The featured companies are: Cenzic, Symantec, ESET, Trend Micro, Sourcefire and TriGeo.
RSA 2010 – Wireless security monitoring results
Motorola AirDefense performed its traditional wireless security monitoring at the RSA 2010 conference. The monitoring was conducted from Day 1 through Day 2 of the conference …
Survey reveals IT skills in demand
Defying expectations amid a global recession, the results of the (ISC)2 2010 Career Impact Survey released today found that more than half of information security …
Multi factor, dynamic encryption for healthcare
Aventyn announced the introduction of healthKrypt, a patent pending technology for securing health information and trusted transaction processing. healthKrypt is a simple, low …
Featured news
Resources
Don't miss
- Open-source benchmark EVMbench tests how well AI agents handle smart contract exploits
- Public mobile networks are being weaponized for combat drone operations
- Attackers keep finding the same gaps in security programs
- China-linked hackers exploited Dell zero-day since 2024 (CVE-2026-22769)
- The era of the Digital Parasite: Why stealth has replaced ransomware