SQL injection (SQLi) attacks rose 69% in the second quarter of 2012 compared with the previous quarter, according to the latest report from secure cloud hosting firm FireHost. FireHost said that, between April and June, it blocked nearly ...
Tags: SQL injection, SQLi attacks, FireHost, secure cloud hosting
The Obama administration "strongly supports" a new cybersecurity bill scheduled to be debated on the Senate floor soon, even though some of its provisions are watered down from earlier legislation, the White House Office of Management and ...
Tags: The Obama administration, supports, cybersecurity bill, the Senate
IDG News Service - The Supreme Court in the Philippines has temporarily restrained the government from enforcing a new controversial cyber law, in response to petitions from civil rights and journalists groups in the country. In a ...
Tags: cyber law, cybercrime, cyber security, Internet
IDG News Service - The U.S.-based Electronic Frontier Foundation criticized new cybercrime legislation that went into effect Wednesday in the Philippines, which has sparked protests over its heavy-handed approach to speech on the internet. ...
Tags: Electronic Frontier Foundation, cybercrime legislation, internet
Computerworld - Two security organizations have released online tools that let Windows users check for possible infections by Gauss, the newly-revealed cyber surveillance malware thought to have been built by one or more governments. ...
Tags: security organization, online tools, Windows, cyber surveillance
Computerworld - A senior Democratic lawmaker is urging President Barack Obama to issue an executive order aimed at protecting the nation's critical infrastructure against cyber threats. In an open letter to the President on Tuesday, Sen. ...
Tags: infrastructure, US, cyber threats, computer network
IDG News Service - The U.S. Federal Communications Commission is advising smartphone users on how to protect their mobile devices and data from mobile security threats. The Commission released an online tool called the "Smartphone ...
Tags: FCC, security advice, smartphone, mobile devices.data
It's urgent for the U.S. Senate to pass a cybersecurity bill now stalled because of opposition from several lawmakers, officials from the U.S. White House said Wednesday. Four White House officials called on the Senate to pass the revised ...
Tags: U.S.Senate, cybersecurity, bill, lawmakers, White House
CSO - It happened more than three and a half years ago. So it presumably would be old news that Chinese hackers broke into soft-drink behemoth Coca-Cola's computer systems and stole confidential files relating to its effort to acquire the ...
Tags: Chinese hackers, Coca Cola, computer system, IT security
Hackers using a Remote Access Trojan (RAT) named Mirage have been engaged in a systematic cyber espionage campaign against a Canadian energy company, a large oil firm in the Philippines and several other entities since at least this April, ...
Tags: Hackers, RAT, Mirage, systematic cyber espionage, energy company
There has been an unprecedented volume of malicious code and attacks - including many high profile incidents - in the Middle East during 2012. Attacks ranged from those performed by cyber criminals to hacktivists and in some cases ...
Tags: malicious code, malicious attacks, high profile incidents, IT Security
ReaSoft Network Firewall 3: Corporate Firewall with DLP elements ReaSoft Development has announced the release of ReaSoft Network Firewall 3, a new version of its popular solution for corporate Internet access management and network ...
Tags: ReaSoft Network, DLP elements, corporate Internet access management
Microsoft will "draw a line in the sand" come April 2014 when Windows XP exits support, security researchers said today, even if millions of customers are still running the aged OS and a zero-day bug threatens the Windows ecosystem. Or ...
Tags: Microsoft, Windows XP, OS, Windows ecosystem
The U.S. government needs a comprehensive doctrine addressing cybersecurity instead of the current patchwork of policies and agencies dealing with cyberthreats, according to a group of experts. The lack of an overarching cybersecurity ...
Tags: U.S.government, cybersecurity, cyberthreats, experts
The Department of Homeland Security has chosen to feature Code Dx, software assurance visualization technology developed by the Secure Decisions division of Applied Visions, on its Build Security In website. NORTHPORT, NY, August 05, 2012 ...
Tags: Secure Decisions, Security, Website, NIST SAMATE Website, software