Hi, what are you looking for?
Silver Tail Systems, Inc., a provider of online fraud and abuse detection and prevention solutions, today announced it has completed a Series B funding round of approximately $20M, led by Silicon Valley Venture Capital firm Andreessen Horowitz.
In a pre-release Announcement, Oracle said that its June Critical Patch Update (CPU), which will be released on Tuesday, June 7, 2011, will contain 17 new security fixes for security vulnerabilities in Oracle Java SE.Security vulnerabilities addressed by this Critical Patch Update affect the following products and components:
Adometry (formerly Click Forensics), a company that helps customers monitor online ad campaigns, including identifying click fraud, today said its Malware Lab has discovered a new highly sophisticated advertising fraud scheme targeting online video, display and search ads.The attack, called “ad hijacking,” uses similar malware and infection delivery methods to create a network of computers aimed at committing advertising fraud through different kinds of advertisements and channels.
The Cloud — While Great — Doesn't Absolve Companies from taking Fundamental Precautions to Safeguard their Systems
Fairfax, Virgina based Cyveillance today launched a solution designed to identify and protect against targeted social engineering attacks and prevent enterprise employees from exposing valuable intellectual property and sensitive information as a result of such attacks.
At the Cloud Computing Expo taking place this week in New York City, Core Security Technologies launched a software-as-a-service (SaaS) based security testing solution for Amazon Web Services (AWS) environments. The service, dubbed Core CloudInspect™ is an automated security testing solution that delivers on-demand intelligence and helps identify exploitable vulnerabilities in systems and web applications while verifying the security of AWS cloud instances.
Are you ready for the zombie apocalypse? You know, the rising of the undead, coming to feed on your living flesh? Animated shuffling corpses in search of your brains? Even the U.S. Center for Disease Control has stepped up their recommendations in the event of the pending zombie apocalypse.
In the hours proceeding the annual Hack In The Box conference in Amsterdam, researcher Don Bailey visited Boston, Afghanistan, Libya, and at the White House. Or so his tracking device reported.
Spam Blocking: How can you Prevent Against False Positives in Your Organization?
Organizations are being challenged to manage the BYOD (bring your own device, which most reports refer to as "consumerization") trend as more employees use powerful and affordable personal mobile devices. More than half of information technology leaders in the US believe that BYOD poses a greater risk to the enterprise than mobile devices supplied by the company, according to a new member survey by the Information Systems Audit and Control Association (ISACA). Yet 27 percent still believe that the benefits...
Google announced today that via its “cloud-based security and abuse detection systems,” it uncovered a campaign to collect user passwords, likely through phishing. “This campaign, which appears to originate from Jinan, China, affected what seem to be the personal Gmail accounts of hundreds of users including, among others, senior U.S.
Researchers from universities and national laboratories in the United States are developing software that mimics ant behavior as a new approach to network security.
Got a Plan to Fight Cybercrime? Don’t Be a Victim. Invest in Your Defenses Now. Cybercrime is on the rise. And it’s no wonder. It’s an incredibly lucrative “business.” In fact, now more profitable than the illegal drug trade, cybercrime generates some $100 billion globally per year.
Trustwave, an information security and compliance solutions provider that recently filed to go public, today announced new features to its Unified Threat Management (UTM) service that provides critical network protection and address regulatory compliance requirements.
As I wrote in an earlier column, “The Optimist’s Cybercrime Predictions for 2011”, in recent years many efforts have been taken to improve the collaboration between various law enforcement agencies around the world. International task forces were established, and cybercrime conferences aimed at law enforcement provide important networking opportunities for agents, allowing them to build relationships with one another.