Please turn on your JavaScript for this page to function normally.
5 handy WordPress security plug-ins, part 2

If you’re one among the millions of users of WordPress, and you really don’t have that much knowledge about what’s going on under the hood, your best bet to …

Skype users targeted by Koobface look-alike

Trend Labs warn about a seeming Koobface variant – TROJ_VILSEL.EA – that targets Skype. It steals information from the user’s Skype profile: login …

Top 5 Firefox add-ons: Security testing and assessment

Test your sites and web applications and perform a security assessment/audit of your work with these handy tools: 1. Tamper Data Use it to view and modify HTTP/HTTPS headers …

Macbook Air prize spam delivers malware

A good rule of thumb when it comes to unsolicited email offers or announcements should be: If it’s too good to be true, it probably is. Add to this grammatical and/or …

Cloud computing pros and cons

Cloud computing – what is it exactly and what benefits does it bring? A new white paper from ISACA describes how enterprises can achieve greater efficiencies and …

IE8 exposes sites to XSS attacks

It’s a little bit ironic when the thing that you put in place to protect you from certain attacks, it’s the thing that, in the end, makes you vulnerable to them. …

MySpace phishing and malware combo

F-Secure warns about phishing emails that urge users to update their MySpace accounts. If you fall for the trick and follow the link, you are taken to a fake MySpace page, …

Trend Micro blocks phishing attempt from “Trend Micro”

It must have been a special pleasure for Trend Micro to block access to the phishing URL and domain that used their name and reputation to scam people. Their analysts came …

FBI’s network against cyber crime

Last week, when the Senate’s Subcommittee on Terrorism and Homeland Security held a hearing entitled “Cybersecurity: Preventing Terrorist Attacks and Protecting …

iPhone worm turns devices into zombies

It took three weeks for someone to again take advantage of the vulnerability that leaves the owners of jailbroken iPhones exposed to attacks, and this time the attack is …

Latest 0-day Internet Explorer exploit

A new exploit made public by an unknown individual on the BugTraq mailing list on Friday could be soon used for attacking unsuspecting surfers that use Internet Explorer 6 and …

Three charged with Comcast.net hijacking

Three men were charged on Thursday for last year’s redirecting of traffic of Comcast’s website to a site where a shout-out to fellow hackers was featured: …

Don't miss

Cybersecurity news