Monthly Archives: October 2011

10 Reasons Social Media is Important to Politicians

Politicians follow wherever voters take them, and today’s voter spends a lot more time than ever before on social networking sites like Facebook. People watch less television, read fewer newspapers and magazines and hardly listen to the radio at all.

More Zero Days in SCADA Systems

Italian security researcher recently revealed details of several vulnerabilities in the system supervisory control and data acquisition (SCADA) from multiple vendors. Luigi Auriemma has released details and proof of concept code for 6 vulnerabilities affecting popular SCADA systems. Most of

Graphing Suspicious URL Relationships

10,000 websites have been compromised to redirect users to a new exploit toolkit called Nice Pack, discovered Wednesday, attempts to take advantage of flaws in users’ third-party apps, such as Java and Adobe, to install the “Zero Access Trojan,”. Malicious

VPN Watcher Monitors VPN Client Security

Virtual private network (VPN) is a network that uses primarily public telecommunication infrastructure, such as the Internet, to provide remote offices or traveling users access to a central organizational network. VPNs typically require remote users of the network to be

Microsoft to fix 23 flaws in October Patch Tuesday security update

Microsoft about to release a new update to fix 23 vulnerabilities on different MS products, this update going to fix several critical vulnerabilities in windows operating system, Internet Explorer, Silverlight and .NET framework. According to the advance notification we find

The Cloud Security Rules Book

The Cloud Security Rules book is available on Amazon.com and selected book stores from October 2011. This book targets decision makers in organizations worldwide. Whether you run a small company, is the president of a global NGO, or the CISO