WhatsApp's violation of privacy law partly resolved after investigation by...
OTTAWA and THE HAGUE, Netherlands, Jan. 28, 2013 -- Canadian and Dutch data privacy guardians release findings from investigation of popular mobile appOTTAWA and THE HAGUE, Netherlands, Jan. 28, 2013...
View ArticleReport: Lost Documents, Portable Memory Devices to Blame for Majority of...
Nearly two-thirds surveyed suffered data breaches according to HCCA, SCCE surveyMINNEAPOLIS, Jan. 28, 2013 /PRNewswire-USNewswire/ -- Lost paper files and portable memory devices account for 65 percent...
View ArticleJoomla com_alfurqan Blind SQLi Exploit
#Exploit Title: Joomla Component com_alfurqan Blind SQL Injection#Google Dork: inurl:"com_alfurqan"#Date: 28/01/2013#Exploit Author: D35m0nd142#Vendor Homepage:...
View ArticleFind out which mobile apps are stealing your identity
Takeaway: Mobile device malware is approaching exponential growth. Mobile apps are the vehicle of choice to deliver malware. Michael P. Kassner looks at our options.Mobile-security pundits preach...
View ArticleFind out which mobile apps are stealing your identity
Takeaway: Mobile device malware is approaching exponential growth. Mobile apps are the vehicle of choice to deliver malware. Michael P. Kassner looks at our options.Mobile-security pundits preach...
View ArticleFind out which mobile apps are stealing your identity
Takeaway: Mobile device malware is approaching exponential growth. Mobile apps are the vehicle of choice to deliver malware. Michael P. Kassner looks at our options.Mobile-security pundits preach...
View ArticleNSIS Systems Launches Recovery-as-a-Service (RaaS) Based on VirtualSharp...
New Service for SMBs Assures Recovery to the CloudMCLEAN, VA--(Marketwire - Jan 28, 2013) - VirtualSharp Software, the leading provider of next generation automated Disaster Recovery solutions for...
View ArticleThe Virtualization Practice Releases 'Secure Hybrid Cloud Reference...
AUSTIN, TX--(Marketwire - Jan 28, 2013) - The Virtualization Practice, an industry analyst firm that provides unique analysis, commentary and resources on Virtualization and Cloud Computing, has...
View ArticleHardware.com Offers Tips for Data Privacy Day
Five practical steps companies can take to minimize internal and external threats to data privacyMINNEAPOLIS--(BUSINESS WIRE)--According to Google Inc., the corporation comes across 9,500 new malicious...
View ArticleVormetric Vault Prevents Downtime and Revenue Loss Associated with Expired...
All-in-One Solution Automates Management of Certificates, Keys and Security ObjectsSAN JOSE, Calif.--(BUSINESS WIRE)--Vormetric, Inc., the leader in enterprise data security, today announced Vormetric...
View ArticleThreat Outbreak Alert: Malicious Files Distributed Via E-mail Messages
DescriptionCisco Security Intelligence Operations has detected significant activity related to spam e-mail messages that claim to contain information about phishing websites for the recipient.The text...
View ArticleThreat Outbreak Alert: Fake Unspecified E-mail Messages
DescriptionCisco Security Intelligence Operations has detected significant activity related to spam e-mail messages that claim to contain an unspecified message for the recipient. The e-mail message...
View ArticleThreat Outbreak Alert: Fake Product Purchase Order Request E-mail Messages
DescriptionCisco Security Intelligence Operations has detected significant activity related to spam e-mail messages that claim to contain sample order details for the recipient. The text in the e-mail...
View Article[ MDVSA-2013:005 ] perl
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2013:005http://www.mandriva.com/security/...
View ArticleTwitter Provides Government Requests For Account Information, Removal...
Twitter says it believes the open exchange of information can have a positive global impact. Therefore for those unaware they provide users with statistics on "Government Requests For Account...
View Articlenew scripts/modules/exploits added to Nmap, OpenVAS, Metasploit, and Nessus
This report describes any new scripts/modules/exploits added to Nmap,OpenVAS, Metasploit, and Nessus since yesterday.== Nmap Scripting Engine scripts (1) ==r30564 ike-version...
View ArticleAirWatch Expands Mobile Email Management Suite with Android Email Container...
Solution Combines Additional Security with Consistent Experience across Android DevicesMobile World Congress 2013ATLANTA--(BUSINESS WIRE)--AirWatch®, the global leader and innovator in mobile security...
View Article[RHSA-2013:0199-01] Important: libvirt security update
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1===================================================================== Red Hat Security AdvisorySynopsis: Important: libvirt...
View ArticleApple updates iOS fixing 27 vulnerabilities and TURKTRUST revocation
Apple has released version 6.1 of its iOS operating system that is the brains of millions of iPhones, iPads and iPod Touch devices.I would consider this to be a critical update, as many of the fixes...
View ArticleMore Than A Dozen Brands Of Security Camera Systems Vulnerable To Hacker...
Digital video recorders have revolutionized home and business security, making it possible to easily store and play back hundreds of hours of surveillance camera footage. But a few design flaws in...
View Article