Seattle-based WatchGuard Technologies – the unified threat management (USM) security vendor – has announced plans to buy privately-held BorderWare Technology, which employs around 90 staff, for an undisclosed sum.
Does weak cloud password security mean local storage is best?
Hard on the heels of researchers at last week’s Black Hat security briefings showing how easy it is to recover third party passwords on Amazon’s EC2 and Microsoft’s Office Online services, Andy Cordial, Origin Storage’s managing director, said that thi…
SquirrelMail open source email project hacked
It now seems that the hacking of the servers of the SquirrelMail open-source email project in late June may have been worse than originally reported.
Arbor Networks shows how Iran filters and blocks internet traffic
Arbor Networks has published internet bandwidth usage figures from June and July that make fascinating reading if you ever wondered how less democratic governments such as Iran filters and blocks internet traffic for their citizens.
Zeus botnet traced to Latvian operation
Researchers have been busy over the last few days tracing where the Zeus botnet is being controlled from, following investigations by the University of Alabama in the US, which tracked down the Zeus Bot virus to a raft of fake internet postcards circul…
US credit reporting system flawed claims information security researcher
Clever hackers are exploiting a number of loopholes in US credit reporting systems to substantially improve their credit rating and so gain access to zero percent loans and low-cost credit cards, an information security researcher said over the weekend.
Black Hat: San Francisco meters hacked for free parking
At the Black Hat security conference in Las Vegas, researchers have revealed how the security of San Francisco’s plans to become a showcase for the US on computerised parking has been compromised.
ISF details top ten future IT security threats
Cybercrime is at the top of the Information Security Forum’s (ISF) Threat Horizon list for 2011, which highlights the growth of `crimeware as a service’ offered by criminal gangs, along with infiltration into organisations to carry out insider attacks.
The correct approach on access assurance revealed
Access assurance may be a complex area, but Stuart Hodkinson, UK general manager with Courion Corporation – along with Fran Howarth, a principal analyst with Quocirca – had more than a few answers in an educational and informative webinar this week.
Adobe confirms Flash contains Microsoft security flaw
Should vendors include programme code from third parties, is the question experts are asking, now that Adobe has acknowledged that it used Microsoft’s allegedly flawed development code in its products.