Please turn on your JavaScript for this page to function normally.
Go Daddy offers vulnerability site scanning tool

A lot of the news concerning Internet domain registrar and Web hosting company Go Daddy that we covered lately had to do with compromised sites hosted on its servers. And …

Facebook bug compromises top pages

A customer of Sendible, an online marketing service for promoting and tracking brands through the use of social media, e-mail and SMS messaging, has inadvertently discovered a …

Facebook “love button” app links to malware

If you spot a Facebook post or a message that advertises an application that will let you “unlock” a “love” (

A closer look at NetShade for Mac

NetShade (v.4.0.1) makes your presence on the web anonymous by routing your connection through a proxy server and acting as the middle-man in your connection. The proxy server …

Orkut users under phishing attack

Orkut users have lately been targeted with a clever scheme that redirects them to phishing pages without them having to do anything except visit a compromised account. Using …

Hotmail gets full-session HTTPS

Firesheep‘s developers can be satisfied. Not only has Microsoft started contemplating SSL for Bing but – as of yesterday – has provided its Hotmail users …

A viable answer to the botnet problem?

As the recent case of the Bredolab botnet takedown has shown yet again, going after C&Cs is ultimately a failed tactic for shutting botnets down. Obviously, it is time to …

Latest IE 0-day exploit finds its way into Eleonore toolkit

Microsoft will likely be forced to issue an out-of-band-patch for the zero-day vulnerability affecting Internet Explorer that has been discovered being exploited in the wild …

Toy robots can guard your home

Worried about burglars ransacking your house? Buy yourself some toy robots! It is what Robert Oschler, a Florida-based programmer, did. He bought a Rovio – a Wi-Fi …

Seven Deadliest Network Attacks

Part of Syngress' "The Seven Deadliest Attack Series", this book introduces the reader to the anatomy of attacks aimed at networks: DoS, MiTM, war dialing, penetration …

Microsoft Kinect may be eavesdropping on you

Released only five days ago, Microsoft’s Kinect seems poised to start a revolution in gaming. And if you are one of the lucky people who already managed to get their …

G20 summit related malicious spam campaign

Spammers are taking advantage of the oddest things. The lately detected spam messages concerning the upcoming G-20 summit in Korea is an example of such a specifically …

Don't miss

Cybersecurity news