Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

The Cyber Intelligence Sharing and Protection Act (CISPA) passed on Thursday with a 248-168 vote in the U.S. House of Representatives. The vote was a day early, and was held just after a number of amendments were approved. As the bill heads to the U.S. Senate, its lost notable form a high profile company and faces a veto from the Obama Administration.

Oracle recently patched a flaw in the TNS Listener service as part of their update release in April. As it turns out, the TNS Poisoning patch didn’t apply to current versions of Oracle, leaving existing customers on their own. The TNS Poison bug has quite the history, researcher Joxean Koret reported the issue in 2008, but the flaw itself has likely existed since Oracle 8i.

Microsoft has patched a recently disclosed password reset vulnerability in Hotmail, which exposed a user base of some 360 million people to having their accounts compromised. Unfortunately, says Vulnerability Laboratory, the firm that discovered the flaw initially, the patch might not have arrived soon enough.

PRAGUE, CZECH REPUBLIC – Counter eCrime Operations Summit - The results of a recent study released by the Anti-Phishing Working Group (APWG) at its Counter-eCrime Operations Summit (CeCOS VI) taking place this week in Prague, showed that PayPal has lost its spot as the most phished brand globally.

CORE Security Technologies, a Boston, Massachusetts-based provider of security testing solutions, this week announced a significant update to its CORE Insight Enterprise security intelligence solution.According to the company, its latest offering helps security professionals identify critical exposures to their infrastructure and link them real-world business risks.

Why Consistency of Security Effectiveness and Performance is Key When Choosing Security TechnologiesHow do you separate marketing hype from reality? One approach is with third-party tests of IT security solutions—an efficient, neutral way to validate vendor claims of solution effectiveness and performance. But it isn’t enough to just look at a point-in-time result. What really counts is consistency year after year. Here’s why.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Adobe is providing incentives for bug bounty hackers to report security flaws in its implementation of Content Credentials and Adobe Firefly.

Cloud Security

Cloud Security

Cloud security giant Wiz has raised $1 billion, which brings the total funding to $1.9 billion, at a valuation of $12 billion.