How Anonymous attacked the Vatican

How Anonymous attacked the Vatican


How Anonymous attacked the Vatican

Posted: 27 Feb 2012 11:08 AM PST

Imperva released a report that reveals details on an attack by hacktivist group "Anonymous" against a high-profile unnamed target - revealed as the Vatican and the church's World Youth Day site by the...

Eliminating malware resident on file shares

Posted: 27 Feb 2012 10:13 AM PST

FireEye announced its File Malware Protection System (MPS) that detects and eliminates advanced malware found on file shares. The solution prevents the lateral spread of malicious code into central da...

0-day risk analysis service by Qualys

Posted: 27 Feb 2012 09:42 AM PST

Qualys launched Zero-Day Risk Analyzer, a new service to help companies protect their IT systems against zero-day attacks which is delivered as part of the QualysGuard Cloud Platform and it includes V...

Software sensor for wireless intrusion detection

Posted: 27 Feb 2012 09:19 AM PST

Fluke Networks today announced a new version of its WLAN security and performance monitoring solution, AirMagnet Enterprise, Version 10, which offers the industry's first Software Sensor Agent (SSA), ...

Interview with Joe Sullivan, CSO at Facebook

Posted: 27 Feb 2012 08:15 AM PST

Joe Sullivan is the Chief Security Officer at Facebook, where he manages a small part of a company-wide effort to ensure a safe internet experience for Facebook users. He and the Facebook Security Tea...

The true state of cloud security

Posted: 27 Feb 2012 08:02 AM PST

Alert Logic released its first State of Cloud Security Report, a semi-annual quantitative analysis comparing real world security incidents observed in hosted and cloud environments with those observed...

Eradicating malware from enterprise web sites

Posted: 27 Feb 2012 07:41 AM PST

Qualys announced a new service to help enterprises detect and eradicate malware from their web sites. Delivered as part of the QualysGuard Cloud Platform and suite of integrated applications for s...

Software patching made easy

Posted: 27 Feb 2012 07:09 AM PST

PC users will be able to keep their software more secure with the launch of the latest version of the Secunia Personal Software Inspector (PSI). The Secunia PSI is a free security scanner aimed at ...

Review: Low Tech Hacking: Street Smarts for Security Professionals

Posted: 27 Feb 2012 07:00 AM PST

Authors: Jack Wiles, Terry Gudaitis, Jennifer Jabbush, Russ Rogers and Sean Lowther. Pages: 264 Publisher: Syngress ISBN: 1597496650 Introduction When talking about hacking, many of us pr...

RSA Conference 2012 opens in San Francisco

Posted: 27 Feb 2012 06:43 AM PST

The world's top information security professionals and business leaders gathered for the opening of the annual RSA Conference being held at San Francisco's Moscone Center. Taking place February ...

CSA launches mobile and innovation initiatives

Posted: 27 Feb 2012 05:27 AM PST

The Cloud Security Alliance announced two significant new initiatives for 2012, addressing growing areas of need in cloud security – mobile computing and innovation. CSA's initiatives in these area...

Transformable security engine from Stonesoft

Posted: 27 Feb 2012 04:50 AM PST

Stonesoft introduced the Stonesoft Security Engine, a transformable security engine that is capable of delivering seven enterprise-class product configuration modes to provide contextually-aware secur...

Design guidelines for mobile app privacy

Posted: 27 Feb 2012 03:49 AM PST

The GSM Association (GSMA), with the support of mobile operators in Europe and following consultation across the wider mobile ecosystem, has published a set of global Privacy Design Guidelines for Mob...

WikiLeaks publishes Stratfor emails stolen by Anonymous

Posted: 27 Feb 2012 02:59 AM PST

WikiLeaks has begun publishing internal emails exfiltrated from the systems of strategic intelligence company Stratfor and has teamed up with 25 media organizations who will be going through them all,...

Compromised websites from a site owner's perspective

Posted: 27 Feb 2012 01:49 AM PST

Malicious actors are often able to compromise legitimate websites without the site owners' knowledge: over 90% of respondents didn't notice any strange activity, despite the fact that their sites were...

Careless management of crucial security instruments

Posted: 27 Feb 2012 01:11 AM PST

A staggering 72% of respondents to a Venafi survey admitted that they have no automated process to replace compromised certificates. This means that if their CA vendor is compromised they will be igno...

Log management deserves a company's respect

Posted: 27 Feb 2012 12:38 AM PST

Keeping and maintaining data logs is a corporate best practice and, in many cases, when you consider regulation and industry standards, it's the law. Still, few companies take advantage of the benefit...

HITBSecConf2012: Revamped live hacking competition

Posted: 27 Feb 2012 12:31 AM PST

What first began as a small gathering for computer security enthusiasts in 2002, Hack In The Box Security Conference (HITBSecConf) has since grown into a must attend event in the calendar of security ...

Week in review: The danger of self-selected PINs, researchers break video CAPTCHAs, and the Consumer Privacy Bill of Rights

Posted: 26 Feb 2012 09:01 PM PST

Week in review: The danger of self-selected PINs, researchers break video CAPTCHAs, and the Consumer Privacy Bill of Rights Here's an overview of some of last week's most interesting news: Bri...

0 comments:

Post a Comment