New Word vulnerability if exploited could allow full system access and control
Palo Alto Networks announced that its Threat Research Team discovered one of the six critical vulnerabilities communicated in Microsoft’s Patch Tuesday security bulletin …
Survey reveals link between privileged users and breaches
Imperva announced that key findings in a new independent benchmark report conducted by Aberdeen Group reveal that monitoring privileged database users significantly reduces …
European mobile operators aren’t protecting users against spam
Cloudmark announced the results of a recent survey, which finds that 100 percent of the top 12 mobile operators in Europe anticipate mobile spam volumes to rise as adoption of …
Consumers trust biometrics for data protection
More than two-thirds (67 percent) of consumers surveyed around the world trust fingerprint scans to verify their identities with banks, government agencies and other …
New AirMagnet Survey features help optimize Voice-Over-WLAN
AirMagnet announced new features for AirMagnet Survey that enhanced its ability to help customers optimize their voice-over-WLAN (VoWLAN) deployments for Cisco and Vocera …
Enterprise-wide approach improves financial crime fighting performance
Research among international financial services organizations undertaken by Norkom Technologies reveals that those who have adopted an enterprise-wide approach to the …
2009 IT security forecast
As 2008 – a year in which a record number of data breaches occurred and over 22 million records were compromised – comes to a close, Utimaco has unveiled the top …
Enhanced line of Sun Fire x64 servers and Sun Blade systems
Sun Microsystems announced an enhanced line of Sun Fire x64 servers and Sun Blade systems that deliver up to 35 percent better performance over previous generations. With the …
Cybercriminals use Flash ads for distributing malicious code
Finjan announced the latest findings by its Malicious Code Research Center (MCRC) indentifying and analyzing the latest trends in cybercrime. Cybercriminals take advantage of …
Targets for malicious attacks in 2009
MX Logic published a list of New Year’s Resolutions that it predicts spammers to make this coming year. They are: 1. Harass users on Facebook, Twitter, MySpace and other …
Minimize your data loss even if .MDB databases are corrupt
DataNumen announced the release of Advanced Access Repair 2.0. If .MDB files are corrupt or damaged, this repair engine will recover the data at the maximum possibility. In …
Organizations struggle with push to encrypt personal data
In a move highlighting the necessity of strong data security regulations to ensure that businesses protect sensitive customer data, new laws beginning to take effect in …
Featured news
Resources
Don't miss
- China-linked Murky Panda targets and moves laterally through cloud services
- Five ways OSINT helps financial institutions to fight money laundering
- DevOps in the cloud and what is putting your data at risk
- Russian threat actors using old Cisco bug to target critical infrastructure orgs
- AWS Trusted Advisor flaw allowed public S3 buckets to go unflagged