Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

It was a shocking discovery that had security experts around the world concerned. In 2008, security researcher Dan Kaminsky exposed a serious flaw in the Domain Name System (DNS) that allowed cyber criminals to easily impersonate websites, intercept email, or steal passwords to hack into corporate networks via DNS cache poisoning attacks.

AVG Technologies, developers of some of the world’s most popular and free anti-virus software for Windows, today announced an offering for Mac lovers. AVG LinkScanner for Mac is a free AVG product designed for the Mac OS X Leopard and Snow Leopard operating systems. It supports the Safari 3.x, Safari 4.x and Safari 5.x internet browsers as well as Mozilla Firefox 3.x and higher.

AT&T acknowledged on Wednesday that a security hole in its Web site had exposed the email addresses of some iPad owners.A group of computer experts that calls itself “Goatse Security” claimed to have exploited the AT&T Web site using part of an HTTP request, triggering a script which would return the associated email address using an AJAX-style response within the Web application.

Boston based Nasuni, a company that helps customers secure data stored with cloud storage providers such as Amazon AWS and RackSpace Cloud, this morning shared some ways to address data security in cloud based storage environments.

Companies are often faced with tough decisions regarding policies on social networking use in the workplace. For many companies, social networking is becoming an essential component of business. From online marketing to supporting clients and interacting with prospective customers, social networking is a valuable tool for businesses small and large. To the contrary, social networking can be a distraction and time wasting activity for those who do not use it for business purposes.

With the excitement surrounding Apple’s iPhone 4 at its World Wide Developer Conference (WWDC) yesterday, Apple decided not talk about the latest version of its Web browser during the Keynote, instead making the announcement and releasing the product later in the day.

The need for organizations to design and adhere to strong security policies in order to maintain the integrity of their systems is well understood. As long as all you have to worry about is your own internal infrastructure, creating the right policies and sticking to them is a great way to help reduce risk on your network. But there are some circumstances where it is necessary to outsource a mission-critical piece of infrastructure to a third party.

Internet infrastructure services provider, Neustar, Inc. (NYSE: NSR) announced today that its registry team has completed deployment of DNSSEC in the .US zone and is ready to accept Delegation Signer (DS) records. The .BIZ zone will follow quickly, accepting records as early as July 15, 2010, making it the second gTLD to be fully DNSSEC-enabled.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

A critical vulnerability tracked as CVE-2024-34359 and dubbed Llama Drama can allow hackers to target AI product developers.

Cloud Security

Cloud Security

Financial terms were not released but the price tag is expected to be hefty with Exabeam’s most recent valuation pegged at $2.5 billion.