RSA Introduces New Integrated Business Continuity, Disaster Recovery and...
New RSA Archer® Solution and Mobile App Helps Customers Prepare for and Minimize Impact of Business DisruptionsBEDFORD, Mass., Jan. 23, 2013 /PRNewswire/ --News Summary:RSA Archer® Business Continuity...
View ArticleBBC Watchdog – NFC and Credit Cards
viaForensics Director of Research and Development Thomas Cannon discusses the use – and misuse – of NFC and credit cards with the BBC.to watch the short clip click on the following...
View ArticleMozilla Firefox Forensics: Part 4
Firefox Database FilesEach User on a system has his or her own SQLite RDMS in their profile and it is important to note that the data in the files is profile specific. Firefox (version 16.0.2)...
View ArticleReporters Without Borders website abused in malware campaign
The site was booby-trapped to deliver a backdoor to vulnerable computers using the latest Java vulnerabilities Reporters Without Borders had its website booby-trapped to deliver malicious software...
View ArticleGE Launches New Cybersecurity Offerings for Industrial Controls Systems
GE's Measurement & Control line of business has introduced two new products to protect industrial controls systems from cyberthreats.The new CAP Software Update from GE is a change management and...
View ArticleAndroid malware spreads through compromised legitimate Web sites
Over the past 24 hours, our sensor networks picked up an interesting website infection affecting a popular Bulgarian website for branded watches, which ultimately redirects and downloads premium rate...
View Article123people launches new services: Webcleaner and Social Network Monitor to...
VIENNA--(BUSINESS WIRE)--123people (www.123people.com), known as a leading people search engine, is launching two new services. Webcleaner and Social Network Monitor are to support users in protecting...
View ArticleThe CIO Is Dead. Long Live the CIO. The Cloud Redefines the Role of the CIO
CIOs See Role Evolving Towards Operational Responsibilities, More Internal Consultancy and Less IT Infrastructure AdministrationLONDON--(Marketwire - Jan 23, 2013) - The role of the Chief Information...
View ArticleAndroid system calls hooking to trace system calls
There are definitely many tutorials on the internet which you can use for system calls hooking but now I try to keep track of all the things I am doing in my own words.Following tutorial will help you...
View ArticleDigiLIBE Management Console 3.4 Execution After Redirect Vulnerabilities
Product: DigiLIBE Management ConsoleVendor: DigitilitiVersion: < 3.4 - ?Tested Version: 3.4Vendor Notified Date: October 09, 2012Release Date: January 18, 2013Risk: HighAuthentication: None...
View ArticleiTop web application vulnerability
############################################################### COMPASS SECURITY ADVISORY http://www.csnc.ch/################################################################ CVE ID : CVE-2013-0805#...
View ArticleThreat Outbreak Alert: Fake Voice Comment Portuguese Language E-mail Message
DescriptionCisco Security Intelligence Operations has detected significant activity related to Portuguese-language spam e-mail messages that claim to contain a voice comment related to a photo on...
View ArticleThreat Outbreak Alert: Fake Better Business Bureau Complaint E-mail Messages
DescriptionCisco Security Intelligence Operations has detected significant activity related to spam e-mail messages that claim to contain an complaint from the Better Business Bureau for the recipient....
View ArticleThreat Outbreak Alert: Fake German Language Contract Information E-mail...
DescriptionCisco Security Intelligence Operations has detected significant activity related to German-language spam e-mail messages that claim to contain contract information for the recipient. The...
View ArticleThreat Outbreak Alert: Fake Wells Fargo Secure Message Notification E-mail...
DescriptionCisco Security Intelligence Operations has detected significant activity related to spam e-mail messages that claim to contain a secure message for the recipient. The text in the e-mail...
View ArticlePolicyPak Releases Software to Manage Java Security Threats
The pre-configured Pak makes it easy for IT admins to lockdown, configure or disable Java.With PolicyPak, you've got the problem bottled up, and you're in charge.(PRWEB) January 23, 2013PolicyPak...
View ArticleThreatMetrix Supports the National Cyber Security Alliance as Data Privacy...
Offers Tips for Consumers to Protect Their Online Identities and Avoid Attacks.San Jose, CA (PRWEB) January 23, 2013ThreatMetrix™, the fastest-growing provider of integrated cybercrime prevention...
View ArticleWhite Source: 85% of Software Projects Include Some Out of Date Open Source...
White Source proactively alerts whenever new versions are available, patching bugs and security issues.White SourceWhite Source Software alerts users promptly and automatically whenever new open source...
View ArticlenProtect Introduces New Features to Mobile Security for Safe Banking and...
nProtect adds keypad remapping and anti-tampering to protect against stealing of mobile informationSan Jose, CA (PRWEB) January 23, 2013nProtect offers mobile banking and payment users with newly added...
View ArticleV-Rooms Tailors Virtual Data Rooms for Financial Audit Process
As V-Rooms releases enhancements to tailor its virtual data room product for audit firms, financial firms turn to V-Rooms Virtual Data Rooms to expedite the audit process and assist with compliance and...
View Article