Yahoo phishing hides in compromised WordPress websites
Yahoo users have been targeted in a phishing attack that starts with an “avoid account deactivation” email. Mousing over the link shows the non-Yahoo link – an easy way to know that something is...
View ArticleSBN Sponsor Post
Submit a session proposal to present at RSA Conference Europe 2012 – Call for Speakers opens April 10th.http://bit.ly/fcI5QA
View ArticleWhat is OWASP? Guide to the OWASP Application Security Top 10
Every vibrant technology marketplace needs an unbiased source of information on best practices as well as an active body advocating open standards. In the Application Security space, one of those...
View ArticleHiding Behind A Mac Is No Longer An Option
For many mid-market and SMB firms one of the benefits of using Apple Macs was that you didn’t have to worry too much about security. At least that was the perception. So besides the “coolness factor”...
View ArticleNissan Confirms Recent Hack
Nissan confirmed its computer systems were hacked two weeks ago. The Japanese automaker said that hackers broke into its network and stole employees’ usernames and encrypted passwords. The company...
View ArticleNortheast Security Leaders Summit
I visited the Northeast Security Leaders Summit in the Roosevelt Hotel in New York City yesterday. The summit is an industry-sponsored one-day event that looks to bring together CISO-level individuals...
View ArticleTrend Micro Announces Partnership With Facebook Offering Users Protection For...
Trend Micro Smart Protection Network uses cloud technology, threat correlation, and a global network of threat intelligence sensors to stop malware and Web threats
View ArticleEuropean Online Fraud Increases 60%
iovation also announces launch of European data center
View ArticleOS X Lamadai: Flashback isn’t the only Mac malware threat
The Flashback trojan has been all over the news lately, but it is not the only Mac malware threat out there at the moment. A few weeks ago, we published a technical analysis of OSX/Lamadai.A, the Mac...
View ArticleValidEdge Unveils Portable Malware Intelligence System
ValidEdge MISbook 2300 can analyze up to 1,000 malware samples per day in a fully functional laptop
View ArticleBT Assure Adds Intelligence And Innovation For The New Security Reality
Exclusive BT research shows opportunity for organizations to "rethink the risk"
View ArticleSSH Communications Security Unveils SSH User Key Management Solution
Solution is first new extension of its SSH Information Integrity Platform
View ArticleNorton And Facebook Partner To Make Web Safer
Partnership brings Norton protection to Facebook members
View ArticleVote for Sophos Naked Security to help us win a Useful Social Media Award
Good news: Someone with *ahem* great taste has nominated us for a Useful Social Media Award. Now all we need is some votes... hint hint.
View ArticleTigerDirect is “Mom Approved”?
Way to capitalize on mothers day and cheesy ”family” pictures…lol Share and Enjoy • Facebook • Twitter • Delicious • Digg • StumbleUpon • Add to favorites • Email • RSS
View ArticleBook Review: Metasploit – The Penetration Tester’s Guide
“Metasploit – The Penetration Tester's Guide” (http://nostarch.com/metasploit) by David Kennedy, Jim O’Gorman, Devon Kearns, and Mati Aharoni is perhaps the most enjoyable book I have come across...
View ArticleWinning! PenTest Manager pwns SC Europe Innovation Award
We Won! :-) Thanks to all the hard work of the Trustwave's Engineering teams, IT, SpiderLabs, and our customers for pushing the limits, overcoming the challenges along the way and making this a...
View ArticleRethink the Risk
We’re surrounded by security risks — everywhere, all the time — but we never give most of them a second thought. We gladly hand over our credit cards to staff in stores and restaurants. We login to our...
View ArticleDigium Releases 3 Asterisk Security Advisories
This week Digium released three security advisories allowing remote authenticated sessions to either crash an Asterisk server or escalate user privileges. The advisories are: AST-2012-004 - Asterisk...
View ArticleFireAMP Creators Series – The Evolution of Advanced Malware Protection
In these videos, we sit down with two of FireAMP's creators, Alfred Huger and Adam O'Donnell, to discuss how FireAMP came to be, why advanced malware protection's time is now, the problems it solves,...
View Article