This month's Microsoft security update, released today, features six bulletins, with one labeled as "critical," four "important" and one "moderate."
Trustwave's 2012 Global Security Report includes a section on passwords that delves into weaknesses in user behavior, administrative policy and the technologies used to manage passwords.
- By Kevin McCaney
- 03/12/2012
Government regulation could hamper efforts to get ahead of innovative bad guys, argued a panel of network executive in a Congressional hearing this week.
- By William Jackson
- 03/08/2012
Google's Chrome Web browser fell to multiple exploits on Wednesday at CanSecWest security conference's Pwn2Own contest.
Microsoft's monthly security update will feature six items – one labeled "critical," four "important" and one moderate, according to the Microsoft Security Bulletin Advance Notification.
Plus, LulzSec crumbles from the inside, readers respond to proposed changes to Windows 8 password procedure.
Adobe released a patch late Tuesday that targets two vulnerabilities in its Flash Player.
Based on information given from the hacker group LulzSec's leader, the FBI has arrested three members of the hacker group LulzSec and charged two others.
- By Kevin McCaney
- 03/05/2012
A lot of contradictory information exists about Hyper-V, but there are some critical management practices that every Hyper-V shop should follow. Follow these tips for storage, ideal VM placement, how best to apply antivirus and more!
Popular search engines continue to direct users to Web sites that serve up malware, researchers say, largely because of techniques that can fool search rankings.
- By William Jackson
- 02/29/2012
Almost 60 percent of company breaches go unnoticed for months to years, according to a security report by Verizon.
South American and European law enforcement agencies arrested 25 individuals believed to be members of hacktivist group Anonymous on Tuesday.
- By Kevin McCaney
- 02/28/2012
President Obama's administration has presented legislation to protect online privacy that includes a consumer bill of rights and a standardized Do-Not-Track feature for browsers.
- By William Jackson
- 02/24/2012
Will facial recognition and photo manipulation replace the traditional password in Microsoft's next OS?
A new agreement will call for app developers to provide clear information on their individual privacy policies before their products are downloaded.
An anonymous analysis of the leaked pcAnywhere source code shows that the software had undergone little change over the past decade.
According to Microsoft, Google circumnavigates Internet Explorer's P3P Privacy Protection feature to track cookies of users.
According to respondents to Arbor Networks' Worldwide Infrastructure Security Report, DDoS attacks are targeting IPv6 networks for the first time since the Internet protocol started implementation last year.
The nation's capitol has topped the list of cities with the highest risk of cybercrime, according to a new report by Symantec.
- By Kevin McCaney
- 02/17/2012
Adobe on Wednesday released a security update that fixed seven Flash Player vulnerabilities, including a zero-day cross-site scripting (XSS) flaw found by Google researchers.