Jaime Blasco, Director of AlienVault Labs, has discovered that Microsoft’s Internet Explorer browser is being exploited by hackers and cyber criminals.
Browsing: Malware and Vulnerabilities
New protection tool from 6Scan works at the web application layer to respond in real time to emerging malware threats.
Security expert Lori MacVittie suggests that technology, including Twitter and RSS feeds, amplify the contributions of infosec professionals and companies.
Any tool we can add to our arsenal to increase security posture should be considered, including security bulletins and CVEs.
A recent survey found that businesses with fewer than 100 employees are significantly less likely to prioritise their IT strategy than larger businesses.
Claus C. Houmann interviews one of the founders of Malware Must Die and discusses information security, hackers, and malware.
The new vulnerability archive XSSposed recently reported its first month results on Twitter @xssposed – 1,087 vulnerabilities on 692 vulnerable websites.
FireLayers weighs in on how to address the CAC market.
Security expert Sarah Clarke discusses the sophistication of Stuxnet and its lasting impact on cybersecurity.
In the wake of the Snowden affair, it is important to keep our facts straight – about cyber war, China, and relevant literature on cyber security.