Dealing with the Aftermath of a Breach Is Challenging, but there are Things you Can do to Keep Things from Going from Bad to...
Hi, what are you looking for?
Dealing with the Aftermath of a Breach Is Challenging, but there are Things you Can do to Keep Things from Going from Bad to...
Microsoft Crushes Another Botnet: "Operation b79" Neutralizes Kelihos BotnetMicrosoft today announced it has taken down the notorious Kelihos botnet, scoring yet another legal victory...
A malware attack targeting MySQL.com was detected today redirecting users to malicious sites hosting a notorious crimeware kit.According to researchers at Armorize, the Oracle-owned...
A decision by OnStar to continue tracking drivers with the company’s GPS technology even after they have cancelled service has drawn the ire of...
The FBI said it has arrested a member of the notorious LulzSec hacking group in connection with his role in attacking the computer systems...
HTTP Request with Modified Header Makes SAP Login Screen Disappear, Researcher SaysSAP environments are often home to an organization’s most important business data, making...
Two security researchers say they have poked holes in the secure sockets layer (SSL) and transport layer security (TLS) protocol with a new tool...
Endpoint Monitor Provides the Foundation for Granting Access to Networks and Cloud Services From only Known Devices, Verified to be Free of MalwareWave Systems...
McAfee Shares its Vision for Securing Mobile Devices in Corporate Environments McAfee unveiled a three-pronged approach to mobile security today with a new set...
In a rare move, Oracle broke its normal procedures and issued an emergency patch due to concerns about the impact of a successful attack.The...
Since the discovery of Stuxnet in 2010, there has been a bit of a bull’s eye on the software used to run industrial control...
McAfee announced new security technology this week that leverages Intel hardware and could be used to fight rootkits.Dubbed DeepSafe, the technology enables McAfee to...