Tripwire, Inc., a global provider of risk-based security and compliance management solutions, today announced Tripwire® Enterprise™ version 8.3 featuring a new, stand-alone Policy Manager™.
Browsing: Malware and Vulnerabilities
Don’t be too hasty to link every Poison Ivy-based cyber attack to China. The popular remote access tool (RAT), which we recently detailed on this blog, is being used in a broad campaign of attacks launched from the Middle East, too.
Google, Iran’s nuclear enrichment plant, the government of Pakistan, the US department of defense… many of the largest enterprises and governments have been victims of Advanced Persistent Threats (APT) during the last two years.
Your status updates and tweets could be revealing more than you think
Michael Brophy, Certification Europe’s CEO, highlights why the human element is the weakest part of your information security system and sets out how to prevent data breaches.
A few months ago we started tracking a botnet (arbitrarily named LazyAlienBikers) whose origins we did not know and whose malware was undetected.
In the realm of infrastructure cybersecurity the period of contemplation has passed and the time for action is upon us.
Versafe, Inc. yesterday announced general availability of the TotALL Online Fraud Protection Suite in North America, the only solution able to both detect and protect against fraud, malware and other online threats without any user involvement.
When it comes to risk management, I believe one of our biggest vulnerabilities is our ability to make good risk decisions based on the information available to us.
Keylogging tools to steal personal and financial information from victims are available as a “service” from a site known as PrivateRecovery