The Secure Decisions Division of Applied Visions and developer of MeerCAT , a visualization toolkit for wireless network security, has been selected as a finalist in the Government Security News (GSN) 2012 Homeland Security Awards ...
Tags: MeerCAT, wireless network security, network, IT security
Pwnie Express, nationally known for innovative penetration testing tools, stormed into DerbyCon as a silver sponsor this year. The company unveiled the newest of their products, the Pwnie Express Enterprise Pentest Appliance (PX-EPA). ...
Tags: Pwnie Express, penetration testing tools, cybersecurity market
IDV Solutions will release Visual Command Center 2.0, a new version of its risk awareness and response software, this October. The Michigan company announced the upcoming release today at the ASIS International 2012 conference for security ...
Tags: IDV Solutions, Visual Command Center, risk awareness, software
The Homeland Security Network has just completed a face-lift that will make it easier and quicker to use the site. The new home page gives user's clear options on where to go to get free educational webinars, educational movies, DVDs, News, ...
Tags: Homeland Security Network, free educational webinars, educational movies
Security researchers have proposed several methods for users to protect their computers from ongoing attacks that target a new and yet-to-be-patched vulnerability in all versions of Java Runtime Environment 7. Most of the proposed ...
Tags: security researchers, methods, ongoing attacks, vulnerability, Java
Java 6 will be retired from security support in less than two months, and users and businesses should prepare now for its demise, experts said today. Oracle will publicly patch Java 6 for the last time on Feb. 19, 2013. After that date, ...
Tags: Java 6, security support, Oracle, upgrade
The technique of using deception and manipulation to gain sufficient knowledge to dupe an unwary individual, employee or company into revealing personal information has the potential to be one of the biggest security threats in 2013 ...
Tags: big data, cloud, Gartner, social engineering, Windows
Research and advisory firm, Gartner, has released its list of technology predictions and trends for the years 2013 and beyond. According to Gartner, its top predictions focus on economic risks, opportunities and innovations that will ...
Tags: CIO, Gartner, IT, predictions, research, technology
There are about 2.2 million people working as information security professionals today, says Hord Tipton, executive officer for security education and credentialing organization (ISC)2 and former CIO of the U.S. Department of the Interior. ...
As many as 300,000 PCs and Macs will drop off the Internet in about 65 hours unless their owners heed last-minute calls to scrub their machines of malware. According to a group of security experts formed to combat DNSChanger, between a ...
Tags: Internet, PCs and Macs, infected computers
The UK should declare cyber war on states and criminals who target the country by using aggressive retaliatory strikes, says Parliament's Intelligence Security Committee (ISC). The call comes in the ISC's annual report, which says too ...
Tags: UK, cyber war, criminals, aggressive retaliatory strikes, ISC
WatchGuard Technologies has announced today that it is the first UTM security appliance vendor to offer a firewall that configures itself. The company is adding a new cloud-based configuration utility – RapidDeploy – that ...
Tags: WatchGuard, security appliance, WatchGuard devices, network security
Security researchers have discovered a new cyber espionage campaign targeting several large companies, including two in the energy sector. The campaign, dubbed Mirage, targeted an oil company in the Philippines, an energy firm in Canada, ...
Tags: Dell, securework, cyber espionage campaign
The world is becoming increasingly connected, so the need for security and privacy is integral to modern society says Raj Samani, vice-president and CTO of McAfee Europe. With everything becoming connected, from smart meters to cars, ...
Tags: security, privacy, McAfee Europe
Security experts are warning businesses to take the publication of encrypted LinkedIn passwords by a hacker seriously. The professional networking site has confirmed that "some" of the stolen passwords posted online by a hacker correspond ...
Tags: security experts, businesses, LinkedIn passwords, hacker