Please turn on your JavaScript for this page to function normally.
Week in review: Facebook, phishing and social engineering

Here’s an overview of some of last week’s most interesting news, articles, reviews, interviews and videos: Google now supports encrypted search Google just rolled …

Video: Facebook privacy changes

There has been lot of talk on the latest Facebook privacy changes. Robert Scoble published a 10 minute video from the Facebook press event where Mark Zuckerberg discussed the …

Trio of new high risk Adobe vulnerabilities

TippingPoint DVLabs updated their list of upcoming security advisories with three new high severity Adobe vulnerabilities. As this is just a preview of future advisories, the …

CERT Basic Fuzzing Framework now available

The Basic Fuzzing Framework (BFF) consists of two main parts: a Linux virtual machine that has been optimized for fuzzing a set of scripts and a configuration file that …

Social Engineering and Dr. Cialdini’s “Influence”

Over the past few years, we have completed a number of social engineering tests as part of advanced penetration testing at various organizations. Coincidentally, I recently …

IBM opens security operations center in Bangalore

IBM announced the opening of a new global security operations center in Bangalore. Adding to the network of IBM global security operations centers, this state-of-the-art …

47% of IT pros see security audit costs going up in 2010

Forty-seven percent of IT security professionals believe that security audit costs will increase in 2010, according to a recent survey by nCircle, the leading provider of …

Facebook users against default sharing of their private data

A poll of 605 Facebook users conducted by IT security and data protection firm Sophos in the wake of the latest changes to the social network’s privacy settings has …

New book: “iPad: The Missing Manual”

In his new book, New York Times tech columnist, bestselling author, and iPad expert J.D. Biersdorfer shows you how to get the most out of Apple’s sleek tablet. With this …

Windows WMI used for malware

Trend Micro’s engineer Lennard Galang has written a blog post about two pieces of malware that leveraged a Windows service, Windows Management Instrumentation (WMI), to …

Breakdown of all the major online threats in May

Latest MessageLabs Intelligence Report reveals that nine out of ten spam emails now contain a URL link in the message. In May, five percent of all domains found in spam URLs …

New version of Google Chrome fixes security issues

Google Chrome 5.0.375.55 has been released to the Stable channel for Linux, Mac and Windows. This version includes the following security fixes: [7713] Medium Canonicalize …

Don't miss

Cybersecurity news