Hi, what are you looking for?
Norman ASA, a provider of endpoint security and anti-malware tools, says that its researchers in Oslo have identified a new Trojan that infected the Nobel Peace Prize site early this morning. The new Trojan was transmitted through a vulnerability in Firefox version 3.5 and 3.6.
Report Reveals the Riskiest Web Domains to VisitWeb risk climbed to a record 6.2% of more than 27 million live domains evaluated for the 2010 Mapping the Mal Web report released today by McAfee. According to the report, the world’s most heavily trafficked web domain, .COM, is now the riskiest, with fifty-six percent of all risky sites discovered ending in .COM.
Smaller botnets are cheaper and easier to build out and operate, and criminals have already realized that large-scale botnets attract unwanted attention
Qakbot Trojan Targets Business Accounts at Financial Institutions
Cloud Service SLA Survival Tips - What should you be asking your cloud provider?So you’ve decided to test the waters of cloud computing, but you have some concerns. You don’t know what you don’t know. Let’s start with a few tips you may want to consider when defining your SLA with the Cloud Provider.
Firesheep Extension for Firefox Enables HTTP Session Hijacking For the Masses. Instantly Hacks Into Facebook, Twitter, Hotmail and Many More Sites With Ease.
Danish private equity firm Dansk Kapitalanlæg has acquired a 31 percent stake in Copenhagen based IT security company, Secunia.Secunia provides on vulnerability intelligence and vulnerability management tools to help companies secure applications and networks.
Google finally admitted (via blog post) that the company's "Street View" cars had collected data including “Entire Emails, URLs and Passwords” from Wireless Networks in several countries
Worldwide revenue for mobile security client software grew 16% between the first and second quarter of 2010, according to Infonetics Research, a market research firm.Infonetics' Security Client Software report provides regional and worldwide market size, select market share, forecasts through 2014, and analysis for security client software for consumer and enterprise desktops/laptops, and for mobile security clients, including data protection clients for smartphones.Some excerpts from its updated 2010 report:
WhiteHat Security, a provider of website risk management solutions, unveiled its Threat Research Center (TRC) this week. The company has assembled a team of website security gurus to operate as an extension of an organization's information security team.
HP’s acquisition of ArcSight has been completed and ArcSight is now officially a subsidiary of HP. HP paid approximately $1.5 billion for the company, shelling out $43.50 per share in cash.
BAE Systems has named Paul Falkler to lead its Cyber Security Solutions business area. Falkler comes to BAE from SAIC, where he served as vice president of Strategic Development. At SAIC, he led the development of a portfolio of cyber security services while also overseeing cyber-related acquisitions.
Pennsylvania’s Chief Information Officer Brenda Orth will resign, effective October 31, according to an announcement made today.The commonwealth's chief technology officer, Tony Encinias, will serve as interim chief information officer while retaining his current position. Brenda Orth was appointed in January 2008. She previously served as chief technology officer for the commonwealth.
Cloud Based Solution Helps Developers Reduce the Cost of Identifying and Fixing Software Defects
Report Examines User and Application Trends in the Enterprise of over 1,100 Applications Across 723 Organizations Worldwide
AntiVirus for MacOS Protects MacOS and Scans iOS Devices to Prevent Transmission of Malware