How Anonymous attacked the Vatican |
- How Anonymous attacked the Vatican
- Eliminating malware resident on file shares
- 0-day risk analysis service by Qualys
- Software sensor for wireless intrusion detection
- Interview with Joe Sullivan, CSO at Facebook
- The true state of cloud security
- Eradicating malware from enterprise web sites
- Software patching made easy
- Review: Low Tech Hacking: Street Smarts for Security Professionals
- RSA Conference 2012 opens in San Francisco
- CSA launches mobile and innovation initiatives
- Transformable security engine from Stonesoft
- Design guidelines for mobile app privacy
- WikiLeaks publishes Stratfor emails stolen by Anonymous
- Compromised websites from a site owner's perspective
- Careless management of crucial security instruments
- Log management deserves a company's respect
- HITBSecConf2012: Revamped live hacking competition
- Week in review: The danger of self-selected PINs, researchers break video CAPTCHAs, and the Consumer Privacy Bill of Rights
How Anonymous attacked the Vatican Posted: 27 Feb 2012 11:08 AM PST Imperva released a report that reveals details on an attack by hacktivist group "Anonymous" against a high-profile unnamed target - revealed as the Vatican and the church's World Youth Day site by the... |
Eliminating malware resident on file shares Posted: 27 Feb 2012 10:13 AM PST FireEye announced its File Malware Protection System (MPS) that detects and eliminates advanced malware found on file shares. The solution prevents the lateral spread of malicious code into central da... |
0-day risk analysis service by Qualys Posted: 27 Feb 2012 09:42 AM PST Qualys launched Zero-Day Risk Analyzer, a new service to help companies protect their IT systems against zero-day attacks which is delivered as part of the QualysGuard Cloud Platform and it includes V... |
Software sensor for wireless intrusion detection Posted: 27 Feb 2012 09:19 AM PST Fluke Networks today announced a new version of its WLAN security and performance monitoring solution, AirMagnet Enterprise, Version 10, which offers the industry's first Software Sensor Agent (SSA), ... |
Interview with Joe Sullivan, CSO at Facebook Posted: 27 Feb 2012 08:15 AM PST Joe Sullivan is the Chief Security Officer at Facebook, where he manages a small part of a company-wide effort to ensure a safe internet experience for Facebook users. He and the Facebook Security Tea... |
The true state of cloud security Posted: 27 Feb 2012 08:02 AM PST Alert Logic released its first State of Cloud Security Report, a semi-annual quantitative analysis comparing real world security incidents observed in hosted and cloud environments with those observed... |
Eradicating malware from enterprise web sites Posted: 27 Feb 2012 07:41 AM PST Qualys announced a new service to help enterprises detect and eradicate malware from their web sites. Delivered as part of the QualysGuard Cloud Platform and suite of integrated applications for s... |
Posted: 27 Feb 2012 07:09 AM PST PC users will be able to keep their software more secure with the launch of the latest version of the Secunia Personal Software Inspector (PSI). The Secunia PSI is a free security scanner aimed at ... |
Review: Low Tech Hacking: Street Smarts for Security Professionals Posted: 27 Feb 2012 07:00 AM PST Authors: Jack Wiles, Terry Gudaitis, Jennifer Jabbush, Russ Rogers and Sean Lowther. Pages: 264 Publisher: Syngress ISBN: 1597496650 Introduction When talking about hacking, many of us pr... |
RSA Conference 2012 opens in San Francisco Posted: 27 Feb 2012 06:43 AM PST The world's top information security professionals and business leaders gathered for the opening of the annual RSA Conference being held at San Francisco's Moscone Center. Taking place February ... |
CSA launches mobile and innovation initiatives Posted: 27 Feb 2012 05:27 AM PST The Cloud Security Alliance announced two significant new initiatives for 2012, addressing growing areas of need in cloud security mobile computing and innovation. CSA's initiatives in these area... |
Transformable security engine from Stonesoft Posted: 27 Feb 2012 04:50 AM PST Stonesoft introduced the Stonesoft Security Engine, a transformable security engine that is capable of delivering seven enterprise-class product configuration modes to provide contextually-aware secur... |
Design guidelines for mobile app privacy Posted: 27 Feb 2012 03:49 AM PST The GSM Association (GSMA), with the support of mobile operators in Europe and following consultation across the wider mobile ecosystem, has published a set of global Privacy Design Guidelines for Mob... |
WikiLeaks publishes Stratfor emails stolen by Anonymous Posted: 27 Feb 2012 02:59 AM PST WikiLeaks has begun publishing internal emails exfiltrated from the systems of strategic intelligence company Stratfor and has teamed up with 25 media organizations who will be going through them all,... |
Compromised websites from a site owner's perspective Posted: 27 Feb 2012 01:49 AM PST Malicious actors are often able to compromise legitimate websites without the site owners' knowledge: over 90% of respondents didn't notice any strange activity, despite the fact that their sites were... |
Careless management of crucial security instruments Posted: 27 Feb 2012 01:11 AM PST A staggering 72% of respondents to a Venafi survey admitted that they have no automated process to replace compromised certificates. This means that if their CA vendor is compromised they will be igno... |
Log management deserves a company's respect Posted: 27 Feb 2012 12:38 AM PST Keeping and maintaining data logs is a corporate best practice and, in many cases, when you consider regulation and industry standards, it's the law. Still, few companies take advantage of the benefit... |
HITBSecConf2012: Revamped live hacking competition Posted: 27 Feb 2012 12:31 AM PST What first began as a small gathering for computer security enthusiasts in 2002, Hack In The Box Security Conference (HITBSecConf) has since grown into a must attend event in the calendar of security ... |
Posted: 26 Feb 2012 09:01 PM PST Week in review: The danger of self-selected PINs, researchers break video CAPTCHAs, and the Consumer Privacy Bill of Rights Here's an overview of some of last week's most interesting news: Bri... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment