For more information about the site, see the Site Index
- Microsoft investigates Internet Explorer CSS bug
- New 'month of bugs' campaign outs LInux-based console flaw
- Microsoft to address DLL load hijacking flaw, issues new tool
- Researchers, ISPs fail to contain notorious Pushdo botnet
- CA to acquire Arcot Systems for SaaS identity management
- Opinion: Security information sharing is a shared responsibility
- Intel-McAfee marriage could fuel renewed chip security interest
- Adobe fixes bevy of critical Shockwave Player vulnerabilities
- CEO must prioritize software development improvements, secure coding
- Microsoft issues advisory on DLL load hijacking flaw
- LANDesk Software acquired by private equity firm
- Intel to acquire McAfee in $7.7 billion deal
- McAfee acquisitions: What could Intel get?
- HP to acquire Fortify Software for secure software development
- PCI Council to address secure coding, key management in PCI DSS 2.0
- Microsoft to address low-level Windows kernel flaw in future update
- Federal telework: Mitigating the security risk
- Kaspersky researcher sees tough road ahead for antivirus detection
- Microsoft fixes serious browser bugs, media handling errors
- Tektronix to acquire Arbor Networks
- Black Hat convention hype hurts the enterprise risk management process
- August Microsoft security bulletins to fix record-tying 34 vulnerabilities
- Reader overflow vulnerability to get emergency Adobe patch
- TippingPoint Zero Day Initiative to push patch deadline on vendors
- Microsoft releases emergency patch for Windows flaw
- Forrester offers new guide for information security program development
- Adobe vulnerability management: Arkin on the new threat landscape
- Microsoft schedules patch for Windows Shell flaw
- ICANN announces DNSSEC deployment to root Internet servers
- Black Hat: Poor SCADA systems security 'like a ticking time bomb'
- Black Hat: Researchers poke holes in HTTPS, SSL Web browser security
- Application event log management: The final frontier?
- Researchers uncover Cisco firewall vulnerabilities, McAfee console flaws
- Verizon data breach report 2010: Insider breaches on the rise
- Microsoft seeks true 'responsible' vulnerability disclosure
- Black Hat: Targeted network security attacks beating forensics efforts
- Juniper to buy SMobile Systems for $70 million
- Mobile threats, SSL weaknesses, Web application bugs at Black Hat 2010
- Black Hat 2010: Complacency over VPN security and management unacceptable
- RSA study: Enterprises should embrace end user influence on technology
- Opinion: Welcome, Apple users, to your new miserable experience
- Deep packet inspection software at root of Red Lambda network security
- Microsoft: Vulnerability disclosure will be coordinated, rather than 'responsible'
- Microsoft issues temporary fix for Windows Shell zero-day
- Spam clogs more inboxes in Idaho, Alabama, spam statistics show
- Mass. hospital deals with lost backup data files
- Attackers target Windows Shell zero-day via USB sticks
- Armorize's Huang cancels Black Hat China talk
- Black Hat 2010: Study tests SSL protocol use, finds SSL errors
- GFI Software acquires Sunbelt, VIPRE antimalware
- Coverity, Armorize to add security to software quality process
- Microsoft fixes serious zero-day flaw, Outlook bug
- Microsoft to patch serious zero-day flaw, fix display driver bug
- Black Hat 2010: New Firefox tool to clean Adobe Flash file errors
- Core Security unveils beta of automated security testing appliance
- More firms targeted by advanced persistent threats, study finds
- Microsoft warns of increased Windows XP attacks against zero-day
- IBM to acquire BigFix for configuration, vulnerability management
- Perimeter defenses deemed ineffective against modern security threats
- Critical Adobe Reader, Acrobat update due today
- Secure Web gateway success hinges on one key feature
- Twitter settles with FTC over security issues, careless policies
- Gartner: Windows 7 security features have strings attached
- Tokenization vs encryption: RSA touts tokens to reduce PCI DSS pain
- Gartner: Enterprises must learn to detect botnet threats
- Gartner: Companies shouldn't bother banning Facebook, social networking
- PCI Standards to be updated on new three-year cycle
- Trustwave buys Breach Security for WAF technology
- Adobe focuses on secure software development lifecycle
- NuBridges update enables simultaneous data center tokenization
- Frustration growing over limited ability to shut down botnets
- Attackers can take out critical infrastructure, but profit lies elsewhere, researcher says
- Next Cyberstorm exercise to stress international cooperation on security
- For Google, DNS log analysis essential in Aurora attack investigation
- Check Point acquires Liquid Machines for enterprise rights management
- Google bug hunter discovers serious Windows XP flaw
- Gartner: IT security spending to remain steady, but not a top CIO priority
- Microsoft emphasizes three critical updates on patch-heavy Tuesday
- Adobe warns of critical security flaw in its products
- Malware discovered in freely distributed Mac applications
- Microsoft to issue 10 security bulletins, three critical
- Network forensics tools increasingly aid security response teams
- Report: Google to phase out Windows, cites security issues
- PCI tokenization guidance could benefit payment processors
- KHOBE attack technique fails to gain major security threat status
- McAfee to acquire Trust Digital for smartphone security
- Judge orders permanent shutdown of rogue ISP, forfeit $1 million to FTC
- Oracle buys database firewall vendor Secerno
- Shavlik moves patch management systems to the cloud
- VeriSign to sell authentication unit to Symantec for $1.28 billion
- Microsoft issues advisory for Windows display driver flaw
- Report: Symantec set to buy VeriSign security unit
- New tool enables botnet command and control via Twitter
- Cigital expands software security model, includes data from 30 major firms
- Adobe fixes 21 security flaws, issues updated Shockwave Player
- Study on security in cloud computing shows angst, rogue users
- Microsoft repairs critical Outlook Express, Visual Basic vulnerabilities
- Cybersecurity legislation creates position with budgetary authority
- Trojan poses as Windows 7 compatibility tool
- Microsoft to issue two critical bulletins, SharePoint to remain vulnerable
- More