TrustKeeper Scan Engine Update
A new update to the TrustKeeper scan engine is being released, with several new vulnerability detections and numerous internal improvements. The new vulnerabilities detected include several that were...
View ArticleSBN Sponsor Post
Get the very latest news all in one place. Become a Facebook fan of RSA Conference. http://on.fb.me/p1hr8l
View ArticleMicrosoft Patch Tuesday July 2012 – TLS and Office for Mac?
We have nine bulletins to deal with this month three of which are rated critical. One of those critical bulletins covers two CVEs in Internet Explorer with the other two critical bulletins in different...
View ArticleSBN Sponsor Post
RSA Conference Europe Keynote: Jimmy Wales of Wikipedia announced as keynote speaker.http://bit.ly/JfcoRI
View ArticleThe Fireworks Continue with July’s Patch Tuesday
IT administrators will have to deal with more fireworks this month with Microsoft’s Patch Tuesday. This month there are 9 patches, 3 of which are critical and 6 important. This is more than double last...
View ArticleLiquidmatrix Security Digest Podcast – Episode 6
Episode 6 — Anybody Know How Google Voice Works? MAGIC! Sorry for the delay in posting folks, someone (cough, @gattaca, cough) has a crappy ISP and someone (cough, SEACREST, cough) talks quietly and...
View ArticleA really simple Drupal 7 example module
A couple of months back I attended DrupalCamp Twin Cities, to try to improve my understanding of Drupal. It was a good event and, thanks to an enlightening talk by Tess Flynn, I now see how the...
View ArticleCTVNews Discusses Password Management
CTV British Columbia sits down with Derek Manky, Sr. Security Strategist, from Fortinet FortiLabs Threat Research, and discuss Internet hackers and password security.
View ArticleNessus and Splunk Coming Together
Nessus and Splunk Coming Together By: Patrick Sayler Don’t get me wrong, Nessus and Splunk are great products in their own right. But what if (you may want to sit down for this revelation) you could...
View ArticleSimple and effective
Although there's no hard evidence for any of the tips from the links below (and it would be nice to collect that!), I've always liked simple security interventions that could reduce risk without the...
View ArticleDown the Rabbithole Podcast – [Episode 19] Bob Arno – the world’s foremost...
Episode 19 of "Down the Rabbithole" is now live with one of the most interesting guests you'll ever have the pleasure of listening to. Keep one hand on your valuables, and listen as we dive into his...
View ArticlePatch Tuesday critical fixes for July 2012
Microsoft has released nine patches this month, including the much awaited fix for MSXML (CVE-2012-1889).
View ArticleIndustrial Espionage Malware Targeting Your Company’s Intellectual Property
How great would the damage be to Apple’s current revenues and image if a competing company had manufactured a smartphone almost identical to the first iPhone and unveiled it before Apple did? By...
View ArticleNSA: Cybercrime is ‘the greatest transfer of wealth in history’
The director of the National Security Agency (NSA) has called cybercrime "the greatest transfer of wealth in history." As such, he urged politicians and the American population in general to support...
View ArticleNetwork Security Podcast, Episode 281
After a month off, we’re back, and just a couple of weeks ahead of BlackHat, DEFCON, and BSides Las Vegas. We’re all so busy and tired we don’t even have any witty dialogue left over from the podcast...
View ArticleAfterGlow Cloud: Initial release
With the marking of the mid-term milestone in GSoC 2012, we're happy to announce a first version release of AfterGlow Cloud. After a lot of discussions and review the project seems to be in a good...
View ArticleCriminals in USB key espionage attempt against Dutch multinational. Or not.
A keen-eyed Naked Security reader alerted us to an interesting-sounding story about a USB-fuelled espionage attempt. (For those who prefer us to write about security successes, not about failures, this...
View ArticleGoogle puts Flash plugin in a more secure browser sandbox
The Flash Player plugin will no longer be the weakest link in Google's Chrome browser.
View Article