Small-to-midsized businesses have smaller IT budgets but face the same security threats as the larger enterprises. In fact, they may be more vulnerable to cyber-attackers precisely because they are less likely to have sophisticated security tools in place. Shavlik Technologies announced May 9 it will be offering Shavlik Security Advisor, an enterprise-class IT management tool, […]
The source code for the Zeus banking Trojan has been leaked on the Internet, which will allow pretty much anyone interested in crafting a malware attack to do so, provided they know where to look. The complete source code for the Zeus malware kit is being freely distributed as a ZIP file on several underground […]
Microsoft addressed two security bulletins in May’s Patch Tuesday release. Security experts said administrators should apply the fixes immediately-because, despite their small size, they address significant threats. Microsoft fixed a critical vulnerability affecting Windows Server and an important bug in Microsoft Office PowerPoint, according to the Patch Tuesday advisory released May 10. Microsoft also assigned […]
McAfee is launching a new security platform designed to protect content and data traffic as businesses and IT departments move from physical to cloud computing infrastructures. These new security tools also come as the IT industry is digesting how secure the cloud after two notable failures at Sony and Amazon. The McAfee Cloud Security Platform […]
The bad news doesn’t stop at Sony, as the company admitted another server was compromised. Considering how many people have already had their information stolen from Sony, 2,500 people sounds paltry in comparison. It’s still personal data that shouldn’t have been stolen in the first place. This time, it was a server containing information provided […]
Regulatory Compliance Enterprises have to keep up with the latest regulations and standards to ensure they remain compliant. Not being compliant potentially can shut down the business, as in the case of failing to comply with the PCI (Payment Card Industry) security regulations. Other federal regulations affecting IT management policies, including Basel, Frank-Dodd, PII, Do […]
The OpenID Foundation last week released a security bulletin warning of a serious bug that allows attackers to modify OpenID authentication data. Sites that have implemented OpenID 2.0 should check to see if the security hole exists and patch it immediately. OpenID is an open-source project that allows users to prove their identity without creating […]
Skype has patched a security hole in its Skype 5 client for Mac that would have allowed malware developers to build a self-replicating worm targeting the Mac OS X platform. Skype fixed a vulnerability that potentially allowed malicious individuals on a user’s contact list to remotely take control of their Macs, the company said in […]
Chinese security company NSFocus opened its North American headquarters in Santa Clara, Calif., and introduced its line of network-security appliances in the United States. NSFocus offers cloud-based Web security services and three hardware appliances with a Web application firewall, network-intrusion detection and prevention, and anti-DDoS) anti-distributed-denial-of-service capabilities. The company made its formal launch announcement May […]
The news that a United States Navy SEAL operation had killed Osama bin Laden in a fortified luxury home in Abbottabad, Pakistan on May 1 dominated headlines the past week. All the major search engines, Yahoo, Bing, and Google, exploded with the volume of bin Laden-related queries as people turned to the Internet for the […]