O’Reilly releases Windows Vista: The Missing Manual
Microsoft will release Vista to general consumers early this winter–but without a user’s manual. Thankfully, David Pogue’s Windows Vista: The Missing Manual …
This week we had Bagle.LA worm and Mitglieder.MF trojan
Bagle.LA is a worm that connects to several web pages to download a list of email server IP addresses. Like all the other worms in the Bagle family, Bagle.LA uses that …
New universal man-in-the-middle phishing kit discovered
RSA uncovered a new phishing kit being sold and used online by fraudsters.This new kit, a Universal Man-in-the-Middle Phishing Kit, is designed to facilitate new and …
Shortcut guide to securing automated file transfers
Realtime Publishers and SSH Communications Security announced the immediate availability of The Shortcut Guide to Securing Automated File Transfers. The new eBook, authored by …
IBM ISS discovers vulnerabilities in CA Storage Management product
IBM announced that its Internet Security Systems (ISS) X-Force research and development team has discovered and preemptively protected customers from two similar, but distinct …
Financial services institutions should consider outsourcing as IT security concerns increase
Financial services institutions should consider outsourcing as IT security concerns increase Company-wide information security used to reside primarily in the realm of arcane …
Email volume set to double in two months unless rate of spam slows
If the amount of spam and viruses being distributed continues to rise at its current rate, the quantity of email traffic online could well double yet again in as little as two …
2007 as year of corporate data leakage concerns and growth of profit-driven spam
Tumbleweed announced the five most pressing messaging security threats that will emerge or continue to plague IT security in 2007. As anticipated, data leakage concerns and …
Sophos acquires Endforce
Sophos announced that it has acquired Endforce, a leader in network access control (NAC) and endpoint security policy compliance solutions for enterprise customers. Sophos …
Scam contract killer email blackmails recipients
IT security firm Sophos is warning internet users about a new spam campaign purporting to come from a professional hitman, in an attempt to steal money. The emails claim that …
Hands-on Trusted Computing workshop at RSA Conference 2007
The Trusted Computing Group (TCG), whose open specifications for computing security have been built into an estimated 50 million trusted systems, will host a half-day workshop …
TopDog 802.11n among first selected for Wi-Fi protected setup testbed
Marvell announced that Marvell’s TopDog 802.11n access point solutions and 802.11a/b/g wireless USB client solutions have been selected as part of the Wi-Fi Alliance …
Featured news
Resources
Don't miss
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits
- Weak enforcement keeps PCI DSS compliance low