Security monitoring – the type involving traditional security information and event management (SIEM) – can be done in some public cloud environments, according to Gartner. And if you're using public cloud services, it's time to ...
Tags: Security, Public Cloud
Oxford University has revealed it suspended use of Google Docs on 14 February following a sustained influx of phishing attacks on the network. The attacks, designed to acquire login details for university systems in order to send spam ...
Cloud hosting company FireHost has claimed that cross-site scripting attacks increased by an estimated 160 per cent in the final quarter of 2012. The company claims that it has detected a spike in what it calls a "superfecta" of attempted ...
Cyber crime has continued to become more professional in 2012, with the barriers to entry becoming ever lower with the emergence of increasingly powerful toolkits and exploits for sale online. In the past year, cyber criminals have used ...
Tags: Protection, Cyber Crime, Products
SQL injection (SQLi) attacks rose 69% in the second quarter of 2012 compared with the previous quarter, according to the latest report from secure cloud hosting firm FireHost. FireHost said that, between April and June, it blocked nearly ...
Tags: SQL injection, SQLi attacks, FireHost, secure cloud hosting
Cross-site scripting(XSS)attacks remain the top threat to web applications,databases and websites,an analysis of 15 million cyber attacks in the third quarter of 2012 has revealed. Other top attack techniques are directory traversals,SQL ...
Tags: XSS, Web Applications, CSRF, Cross-site attacks
Security experts say the breach that led to the publication of the login details of more than 453,000 Yahoo and other companies'customers,highlights common enterprise security failings. The hacking group,known as D33Ds Company,said they ...
Tags: Security, Yahoo Voices, Hacking Group, Application