For more information about the site, see the Site Index
- Android malware uses Anime character Anaru to entice users
- Napolitano calls for cybersecurity intelligence information sharing
- Google acquires file scanner VirusTotal
- Aurora attackers target defense firms, use flurry of zero-days
- Two important bulletins in September 2012 Patch Tuesday Advance
- Security firm warns of Android mobile toll fraud in latest mobile malware report
- New Pushdo variant floods legitimate websites to camouflage requests
- McAfee sees continued rise in Android malware
- FireEye warns of steady increase in advanced malware
- Oracle issues Java security update fixing dangerous zero-day vulnerabilities
- Java sandboxing could thwart attacks, but design may be impossible
- Attack code surfaces targeting Java zero-day flaw
- Emergency Adobe update APSB12-19 addresses more Flash Player flaws
- Disttrack discovery highlights growing use of targeted malware
- Bafruz backdoor Trojan disables security and antivirus products
- SearchSecurity survey reveals top 5 enterprise mobile security issues
- Google Pwnium hacking contest backed with $2 million in rewards
- Oracle releases Java SE 7 Update 6, will support Java for Mac OS X
- BYOD gaining ground as employees increasingly need mobile access
- Adobe patches Flash Player vulnerability being actively targeted
- August 2012 Patch Tuesday fixes flaw being actively targeted by attackers
- Mobile device security policies should be revisited and revised often
- Oracle security advisory addresses Black Hat database flaw disclosure
- Five critical vulnerabilities expected in August 2012 Patch Tuesday
- Gauss toolkit used in nation-state-sponsored cyberattacks, Kaspersky says
- Smartphone, BYOD security risks fuel interest in MDM platforms, survey finds
- Third-party Android markets host bulk of mobile malware, says F-Secure
- Organizations have poor digital document security, survey reveals
- Scope of Dropbox security breach is undetermined
- Dropbox to implement two-factor authentication
- Black Hat 2012: Pepper Flash sandbox bolsters Google Chrome security
- Security researcher wins Microsoft Blue Hat prize for kBouncer
- Black Hat 2012: SSL handling weakness leads to remote wipe hack
- Apple's AuthenTec purchase may pave way for iOS biometrics
- Black Hat 2012: David Litchfield slams Oracle database indexing
- Black Hat 2012: Apple tech talk a missed opportunity, researchers say
- Black Hat 2012: Poor mobile app security drains enterprise data
- Black Hat 2012: On-stage NFC hack highlights NFC security issues
- Black Hat 2012: Dan Kaminsky tackles secure software development
- Black Hat 2012: Limited release for tool allowing smart meter hacks
- Crisis Trojan, new Mac OSX Trojan, considered a low risk for now
- Black Hat 2012: Luminaries worried about social engineering techniques
- Symantec CEO ouster doesn't surprise industry analysts
- Black Hat 2012: Malware analysis system could aid research, boost defenses
- Black Hat 2012: MITRE to detail STIX cyberthreat intelligence system
- Grum botnet takedown will not lead to less spam overall, experts say
- Black Hat 2012: Google Bouncer compromises tax Android app security
- Black Hat 2012: Hackers to explore malware analysis, next-gen attacks
- Attackers dropping Mahdi spyware on oil facilities, embassies, say researchers
- Ten must-see Black Hat 2012 sessions
- Black Hat 2012: Social engineering training benefits IT teams, end users
- Black Hat 2012: Speakers trending more than session topics
- Black Hat 2012: Windows 8 security features beat buffer overflow attacks
- Black Hat 2012: Phoenix, Black Hole toolkits rising in sophistication
- Black Hat 2012: Google Chrome sandbox security flaws to be exposed
- Microsoft revokes additional digital certificates due to encryption weakness
- Microsoft repairs dangerous XML Core Services zero-day flaw
- Microsoft to fix Internet Explorer 9 in July 2012 Patch Tuesday
- DDoS mitigation a key component in network security
- Network threat detection moves beyond signatures
- Botnet infections in the enterprise have experts advocating less automation
- FBI undercover operation leads to huge online credit card fraud sting
- Password database inventory required following LinkedIn breach
- Flame malware a lesson in nation-state hacking tactics, expert says
- Chris Wysopal: Web application vulnerabilities an easy target
- UGNazi hacker group claims responsibility for Twitter outage
- Gartner: Web app firewalls can support secure application development
- Google detects 9,500 new malicious websites daily
- Metasploit adds Microsoft exploits for MSXML, Internet Explorer flaw
- Intel CPU hardware vulnerable to a privilege escalation attack
- Global Payments processor breach expands, merchant data exposed
- Spear phishing attacks target defense contractors, security firms
- Microsoft auto update feature for revoking fraudulent certs added
- Gartner warns enterprises against jailbroken device security risks
- Microsoft June 2012 Patch Tuesday addresses flaws in IE, RDP
- Database security assessment vital to password protection, experts say
- Gartner: Big data security will be a struggle, but necessary
- Dell doubles SecureWorks, plans additions to security portfolio
- Stuxnet-Flame link confirmed, Kaspersky researchers say
- All leaked LinkedIn passwords disabled, users notified
- Adobe Flash Player security update fixes flaws, issues Firefox shield
- Arbor Networks warns of IP-Killer, MP-DDoser DDoS tool
- LinkedIn alerts authorities, Facebook notifies potential password victims
- June 2012 Patch Tuesday: Microsoft to fix Windows, Internet Explorer flaws
- eHarmony resets account credentials following LinkedIn password leak
- Google state-sponsored security warning supported by network inspection
- LinkedIn investigating user account password breach
- Microsoft to harden Windows Update in overhaul to address weaknesses
- Microsoft revokes fraudulent certificates used by Flame malware toolkit
- Kaspersky Flame malware poses little threat to businesses
- CISOs struggle with visibility, complexity in enterprise risk management
- The Flame malware fuels discussion on cyberwarfare threats
- P2P encryption for mobile is not an technology endorsement, says PCI Council
- Android Malware Genome Project aims to nurture mobile security research
- Wysopal on application security training, program gaps
- Praise, criticism for retiring cybersecurity coordinator Howard Schmidt
- PCI Council urges P2P encryption for mobile payments
- Steve Lipner on the Microsoft SDL, critical infrastructure protection
- Android security model doing best to enable mobile malware spread
- Gartner report: UTM market on the upswing, expert says
- More