dcsimg

Hackers: Archive: February 2011 

Simple Malware Makes the Rounds

From browser attacks to SSD security troubles – Paul Rubens’ thoughts on the month in IT security and Sony’s big PS3 security fail.

State CIOs Ask Governors for Stronger Cybersecurity

As a wave of new governors sweeps into office facing major budget shortfalls, states' top tech officers want to keep cybersecurity off the chopping block.

Mac OS X Users at Risk from 'BlackHole RAT'?

Sophos researchers warn of new trojan targeting Mac OS X.

Rapid7 Exposes Flash Vulns with NeXpose

Updating the Flash player isn't enough to protect against Flash vulns that could be lurking inside applications.

How to Protect an Entire Network with Untangle

The Untangle platform can cover an entire network, providing protection for mobile devices and adding a second layer of protection for PCs.

RSA: New Frontiers in Threat Research

RSA speakers drill into emerging attacks and trends, from unruly apps to malicious tweets.

The Top 10 Botnet Events of 2010

2010 was a banner year for botnet boons and busts.

RSA: How Real is the Threat of Cyberwar?

Security experts debate whether we're already in a cyberwar, the role of government and potential solutions.

Oracle Updates Java for 21 Vulnerabilities

Big update for Java includes fix for floating point issue disclosed earlier this month.

RSA: Cisco Aims for Context-Aware Security with SecureX

New security framework brings TrustSec to firewalls and expands overall awareness of security throughout the network.

RSA: Dasient and Cenzic Team Up to Exploit Web Apps

The security vendors team up to demonstrate how modern drive-by download attacks occur and what site owners can do to prevent themselves from being victims.

RSA: IBM Rolls 20Gbps IPS Network Appliance

IBM unleashes its most powerful network security IPS ever in an effort to help secure the biggest networks as fast as possible.

RSA: McAfee and RSA Expand Security Collaboration

Integrating the two firms' security products to provide a "holistic" approach to enterprise-wide views.

Juniper Debuts Virtual Security Firewall Gateway

Virtual gateway security debuts to help secure virtual assets from real attacks.

Upgrading Wi-Fi Security from WEP to WPA2

WEP security can easily be cracked. That’s why you should use Wi-Fi Protected Access 2 (WPA2) to protect your wireless network.

Mobile Devices: The Dark Side's New Playground

The laptop in your bag is probably as secure as it can get, but the smartphone in your pocket is about as secure as your voicemail. The scariest thing? No one really seems to care.

Microsoft Fixes 22 Security Holes - 6 Critical

Microsoft fixes a slew of security bugs in its second patch drop of the year.

Do You Know Where Your Digital Certificates and Encryption Keys Are?

Venafi says more than half of enterprises can't account for digital certificates on their networks or encryption keys. The answer, it says, is automating management of these assets.

Do You Need a Web Application Firewall?

New study shows more than 70 percent of enterprises have been compromised in the last two years.

New Malware Strains Use Facebook Access as Bait

Software vendor Panda Security reports that new pieces of malware are taking advantage of people's obsession with the social networking site.

New Spam-Based Tax, Survey Scams Surface in January

AppRiver's January Threat and Spamscape notes a surge in new tax-related malware campaigns and the impact of the Rustock botnet on total spam production.