In a new blog post from Scott Greaux, VP of PhishMe, the ways organisations can use metrics to measure and improve security is discussed.
Browsing: Malware and Vulnerabilities
In a new blog post from Brian Krebs, the recent discovery from Imperva that more than 35,000 websites have been hacked through a vBulletin hole, is discussed.
Live Webinar to Delve into New Mobile, Web Services & RIA Development Formats to Understand Why Applications are Littered with SQL Injections
Riskive, the Social Risk Management company, today unveiled FriendGuard, a free app that leverages advanced math and science to protect individuals and families against social identity theft and malware attacking their social accounts.
Security flaws in Google Chrome could enable attackers to capture personal data stored in the browser’s history files, researchers said Friday.
A group of embedded device hackers has turned up a vulnerability in D-Link consumer-level devices that provides unauthenticated access to the units’ admin interfaces.
Linux Patch Management offers Linux professionals start-to-finish solutions, strategies, and examples for every environment, from single computers to enterprise-class networks.
Many security professionals have heard about Command & Control botnets, even more have been infected by them. Very few have had the opportunity to actually look inside the server control panel of a C&C.
AlienVault research engineer, Alberto Ortega has identified two Yara rules that will help malware analysts and incident responders to detect, classify and track the malware arsenal of the recently leaked KINS toolkit.
Recently I was reminded of this well used, wedding related phrase when my daughter announced her intention to marry. A joyous occasion for all, except, of course, the father of the bride (yes we’ve all seen that film!).