Safeguard inventory and sensitive assets
MIKOH Corporation introduced Smart&Secure Warehouse, a packaged solution that delivers physical security and tamper evidence for inventory management and advanced RFID …
Signature-less real time protection against malware
NovaShield announced NovaShield AntiMalware version 2.0, a behavior-based security software for Windows XP and Vista designed specifically to detect, block, and remove …
Detailed malware report for July 2008
The format of the ‘Virus Top Twenty’ reports from Kaspersky Lab has changed as of July 2008. The previous method used to compile these reports and to assess the …
Apple update patches DNS vulnerability
Today Apple released Security Update 2008-005 and below is the list of updates. Open Scripting Architecture A design issue exists in the Open Scripting Architecture libraries …
89% of security incidents went unreported in 2007
RSA Conference released the results of its recent survey of security professionals regarding the critical industry and infrastructure issues they currently face. The survey …
New worm attacking MySpace and Facebook
Kaspersky Lab has detected two variants of a new worm, Networm.Win32.Koobface.a. and Networm.Win32.Koobface.b, which attack MySpace and Facebook. As part of their malicious …
Facilities Physical Security Measures Guideline draft
The ASIS Commission on Standards and Guidelines has released a draft of the Facilities Physical Security Measures Guideline. The purpose of this new guideline is to describe …
McAfee to acquire data loss prevention expert Reconnex
McAfee, Inc. announced a definitive agreement to acquire privately owned Reconnex for $46 million in cash. Reconnex is a leading data loss prevention company with unique …
Pre-release copies of Fyodor’s upcoming book “Nmap Network Scanning”
Nmap author Fyodor will soon be releasing Nmap Network Scanning, the official guide to the Nmap Security Scanner. From port scanning basics for novices to the type of packet …
Findings of the E-threats landscape report
Eighty percent of malware distributed worldwide consisted of Trojans according to the “E-Threats Landscape Report,” the first in a series of comprehensive security …
Emergency workarounds for Oracle’s zero-day vulnerability
Recently an exploit has become publicly available which may impact the availability, confidentiality or integrity of WebLogic Server applications which use the Apache web …
Fake JetBlue eTickets come with malware
The most common way a user gets infected these days is through drive-by downloads and while the prevalence of malicious email attachments definately has gone down, this trend …
Featured news
Resources
Don't miss
- Lumma Stealer Malware-as-a-Service operation disrupted
- Data-stealing VS Code extensions removed from official Marketplace
- Flawed WordPress theme may allow admin account takeover on 22,000+ sites (CVE-2025-4322)
- What good threat intelligence looks like in practice
- AutoPatchBench: Meta’s new way to test AI bug fixing tools