Security may be among the last items in an IT budget to get slashed, but it is still not totally recession-proof. Sometimes, staffers are shown the door, leaving laid-off security professionals with the need to stand out in a crowded field with potentially fewer opportunities. New research from ISC2 (International Information Systems Security Certification Consortium), […]
Microsoft is looking for customers interested in participaintg in an incubator project for online synchronization of databases. Microsoft has dubbed the effort -Project Huron.’ Part of Microsoft’s growing focus on the cloud, Project Huron is aimed at making data synchronization easier within SQL Data Services. “The goal is to remove the typical complexities (configuration, scalability, […]
Researchers at the University of California, Santa Barbara, have published a paper saying they turned up a treasure trove of stolen data after seizing control of a notorious botnet. The team of researchers hijacked the Torpig botnet, (PDF) which they linked to the theft of some 10,000 bank accounts and credit card numbers during a […]
Adobe Systems is planning to release a patch for a zero-day flaw affecting Adobe Reader and Acrobat next week. This is the second zero-day flaw known to have been found in Adobe’s Reader and Acrobat products since March. On May 12, Adobe will push out a fix for versions 7, 8 and 9 on Windows […]
Twitter co-founder Biz Stone has confirmed a hacker was able to breach security at the microblogging service, marking the second time this year an attacker gained administrative access via an employee’s account. According to Stone, an attacker gained unauthorized access to Twitter this week and viewed 10 individual accounts. Twitter’s initial security review found that […]
A French hacker reportedly used social engineering to get Twitter administrative access and posted screenshots of data belonging to several high-profile celebrities. The hacker, operating under the handle of Hacker Croll, posted 13 screenshots of Twitter’s admin panel. The screenshots include internal data for accounts belonging to a number of high-profile figures, including Ashton Kutcher, […]
Trend Micro is extending its data center protection strategy with a planned purchase of server and application security vendor Third Brigade. According to Trend Micro, the company is buying the business to accelerate its dynamic datacenter security strategy and to provide customers with access to critical security and compliance software and vulnerability response services. The […]
While Adobe Systems works to patch the recent zero-day bug discovered in its Adobe Reader and Acrobat products, new data from Qualys suggests many users are so behind in patching that hackers needn’t feel rushed to exploit the flaw. According to Qualys, there has been no significant reduction in the number of machines vulnerable to […]
For the past several years, every time someone at the FBI wanted to search for a name in its Investigative Data Warehouse, they could count on technology from Chiliad working in the background. Think of it as an uber Google – a search engine capable of pulling information from all of your organization’s databases. “The […]
McAfee has its eyes on the small and midsize business market with a push based on software as a service and unified threat management. The focus on SMBs follows a similar move by Symantec, which recently announced plans for an SMB-focused version of Symantec Endpoint Protection. In McAfee’s case, the company is pushing a new […]