-
Citrix patches severe XenDesktop, XenApp security flaw
The virtualization vendor says a severe XenDesktop and XenApp security flaw needs immediate patching, or else an attacker may execute arbitrary code.28 Jul 2011
-
New Google hacking tools on tap for Black Hat 2011
Security researchers are expected to release new search engine hacking tools that organizations can use to determine if their sites are vulnerable to attack, or leaking information.27 Jul 2011
-
Secure tokens: Preventing two-factor token authentication exploits
What are the most common attacks against two-factor authentication, and how can you protect against them? Expert Nick Lewis weighs in.26 Jul 2011
-
Automated attack toolkits single biggest threat to Web apps, report finds
Automated attack tools are targeting directory traversal bugs, cross-site scripting errors, SQL injection flaws and remote file inclusion vulnerabilities.26 Jul 2011
-
Black Hat 2011: Hacking technique targets Windows kernel errors
Researcher Tarjei Mandt uncovered dozens of hidden vulnerabilities deep inside Microsoft Windows.26 Jul 2011
-
Black Hat 2011: Special conference coverage
The 2011 Black Hat security conference, held in Las Vegas, highlights software vulnerabilities, network security errors, hacking techniques and other weaknesses that can be used by cybercriminals t...25 Jul 2011
-
An inside look into OWASP’s Mantra tool
OWASP’s Mantra tool is being praised by security pro’s for its abundance of options and ease of use. In this screencast, Mike McLaughlin takes a look at what Mantra has to offer.25 Jul 2011
-
Allesandro Acquisti to take down privacy with facial recognition at Black Hat
Privacy researchers Alessandro Acquisti and Ralph Gross have converged facial recognition technology with publicly available personal information on social networks to identify individuals.25 Jul 2011
-
Balancing compliance with information security threat assessment
Compliance is often the driver for security spending rather than real risks. Learn how to incorporate current threats into a compliance program.25 Jul 2011
-
Kaspersky CTO: Open Apple iOS restrictions for security vendors
Kaspersky CTO wants Apple to open up its iPhone platform, but that could increase the risk of threats, say some security experts.22 Jul 2011
-
(ISC)² Security Congress 2012
Exhibit Dates: September 10th-13th
Pre Conference Seminar Dates: September 8th & 9th
Location: Pennsylvania Convention Center, Philadelphia, PA21 Jul 2011 -
Google malware warning system alerts users about infections
The new malware alert feature is in response to unusual search traffic detected in the search engine giant’s servers.21 Jul 2011
-
Buying IT security products? Learn to recognize vendor hype
Some vendors will do or say just about anything to get you to buy their products. Whether the products work as advertised is another story.21 Jul 2011
-
The Obama administration’s Identity Ecosystem plan: What to expect
President Obama's proposed Identity Ecosystem seeks to lock down personal credentials, but is it actually feasible?20 Jul 2011
-
Black Hat 2011: Researchers to demonstrate Android attack
Researchers will demonstrate an Android phone drive-by attack using a vulnerability in Skype and the smartphone’s Webkit browser engine.20 Jul 2011
-
How to collect Windows Event logs to detect a targeted attack
Targeted attacks are growing, and eventually your enterprise will be a target. Expert Richard Bejtlich covers how to collect Windows Event logs to detect an intrusion.18 Jul 2011
-
Dan Guido on teaching penetration testing courses; intrusion analysis
The iSec Partners consultant talks about his penetration testing courses at NYU, his research on intrusion analysis and rethinking intrusion defense.18 Jul 2011
-
Internet Explorer 9 security surpasses rivals in blocking social engineering attacks
Independent testing firm NSS Labs found that Internet Explorer 8 and 9 have better social engineering blocking technology, exceeding the Chrome, Firefox or Safari browsers.18 Jul 2011
-
Microsoft offers bounty in hunt for Rustock spambot operators
A $250,000 reward is being offered to anyone who provides new information that results in the identification, arrest and criminal conviction of the cybercriminals behind the Rustock botnet.18 Jul 2011
-
Don Bailey on mobile device threats, mobile device security policy
In this video, researcher Don Bailey of iSec Partners discusses the myriad threats facing corporate mobile devices, and how to stop them.15 Jul 2011
Security Management Strategies for the CIO