Security Weekly News 1 April 2011 – Full List

Category Index Hacking Incidents / Cybercrime Software Updates Business Case for Security Network Security Web Technologies Privacy General Funny Hacking Incidents / Cybercrime Comodo: two more resellers were compromised  [www.h-online.com] Comodo has confirmed that two other resellers have been compromised since the ‘Comodogate’ attacks which saw an attacker generate forged certificates for login.live.com, mail.google.com, www.google.com, …

Security Weekly News 25 March 2011 – Summary

Thanks to Tadek for contributing to this security weekly news bulletin Feedback and/or contributions to make this better are appreciated and welcome Highlighted quotes of the week: “If Iran got some forged certificates, it’s only because they don’t have a CA of their own. It’s considerably less hassle for most countries.” – Moxie Marlinspike (Abraham’s …

Security Weekly News 25 March 2011 – Full List

Category Index Hacking Incidents / Cybercrime Unpatched vulnerabilities Software Updates Business Case for Security Web Technologies Network Security Mobile Security Privacy General Funny Hacking Incidents / Cybercrime   The Recent RA Compromise  [blogs.comodo.com] On March 15th 2011, a Comodo affiliate RA was compromised resulting in the fraudulent issue of 9 SSL certificates to sites in …

Security Weekly News 18 March 2011 – Summary

Thanks to Tadek for contributing to this weekly security news bulletin Feedback and/or contributions to make this better are appreciated and welcome Highlighted quotes of the week: “The media (and general community) responses on the nuke meltdown highlight human inability to contextualize risk.” – Rich Mogull “Getting a lot of enquiries lately to help orgs …

Security Weekly News 18 March 2011 – Full List

Category Index Hacking Incidents / Cybercrime Unpatched Vulnerabilities Software Updates Business Case for Security Web Technologies Network Security Mobile Security Privacy General Funny Hacking Incidents / Cybercrime Open Letter to RSA Customers  [www.rsa.com] Like any large company, EMC experiences and successfully repels multiple cyber attacks on its IT infrastructure every day. Recently, our security systems …

Security Weekly News 11 March 2011 – Summary

Feedback and/or contributions to make this better are appreciated and welcome Highlighted quotes of the week: “Pwn2own breaking news: browsers still have vulnerabilities, and there still are people who know how to exploit them.” – Michal Zalewski “Just reached a company CEO on his cell to tell him that his firm’s dbase & cust. CCs …

Security Weekly News 11 March 2011 – Full List

Category Index Hacking Incidents / Cybercrime Software Updates Business Case for Security Web Technologies Network Security Database Security Mobile Security Physical Security Tools Funny Hacking Incidents / Cybercrime   Cord Blood Registry Notifies 300,000 Of Potential Data Loss  [www.darkreading.com] Backup tapes stolen from employee's car contained unencrypted data The Cord Blood Registry earlier this week …

Security Weekly News 4 March 2011 – Summary

Thanks to Tadek and Toby for contributing to this weekly security bulletin! Feedback and/or contributions to make this better are appreciated and welcome Highlighted quotes of the week: “As a majority of security professionals know, there is more risk and a higher probability of an attacker causing mayhem from within an organisation than from outside …

Security Weekly News 4 March 2011 – Full List

Category Index Hacking Incidents / Cybercrime Unpatched Vulnerabilities Software Updates Business Case for Security Web Technologies Network Security Mobile Security Cryptography Privacy Funny / Odd Hacking Incidents / Cybercrime   GhostMarket cyber crime forum fraudsters jailed  [www.v3.co.uk] Four British men sentenced for their part in the largest cyber crime forum ever discovered The UK founder …

Security Weekly News 25 February 2011 – Summary

Quick note: As there seems to be an interest regarding mobile security I have decided to include that section of the full news in the summary, so the order for the summary will be now: business case for security, cloud security, mobile security, network security, web technologies, OWASP secure development guide snippet. You can always …