Gumblar Malware's Home Domain Active Again
ScanSafe researchers are seeing renewed activity regarding Gumblar, a multifunctional piece of malware that spreads by attacking PCs visiting hacked Web pages.
6 Steps to Pull App Security Back to the Future
OWASP will host its 2009 AppSec DC conference next week, hoping to arm IT security practitioners with knowledge to improve application security. For a taste of what to expect, organization member Matt Fisher discusses what's wrong with app security today and six ways to make it better.
Survey: Security Certifications Hot Among IT Pros
CompTIA finds IT pros value and seek new security-related certifications above all other areas.
Nominations Open for 2010 Compass, NEXT Awards
CSO's Compass Awards honor outstanding security leadership; the NEXT Awards recognize the field's up-and-comers. Application deadline is December 22, 2009.
- CDC Tracking H1N1 in Near Real Time
- Postini Tech to Spread Across Google Apps
- 7 Ways to Be Happy in a Difficult Infosec Job
- Counterfeiting Still Going Strong
- Vendors Scramble to Fix Bug in Net's Security
- 3-Year-Old Office Patch Stymies Most Attacks
- Botnet Authors Crash WordPress Sites
- MS Architect: Windows 7 Will Slash Malware
- Java, BlackBerry Desktop Get Security Fixes
- MS Record of Correctly Calling Attacks: 27%
- More Headlines
- Change Topic
Data Protection
- 6 Steps to Pull App Security Back to the Future
- Vendors Scrambling to Fix Bug in Net's Security
- Botnet Authors Crash WordPress Sites with Buggy Code
- Three-Year-Old Office Patch Stymies Most Attacks
- Analyst: PCI Security a Devil, 'Like No Child Left Behind'
- Java, BlackBerry Desktop Get Security Bug Fixes
- Microsoft Correctly Predicts Reliable Exploits Just 27% of the Time
- Put Cybersecurity Chief in DHS Not the White House, Senator Says
- Alleged Cable Modem Hacker Indicted in US
- Microsoft Links Malware Rates to Pirated Windows
Security Directions: A Virtual Conference
Available On Demand Sept. 30 - Dec. 30
Join us for a virtual event with candid, expert information on top security challenges and issues - all from the comfort of your desktop.
Protecting PII: How to Work with IT to Manage Risk
Understand the critical nature of the test data privacy problem and get tips on how to work with IT to implement a test data privacy program.