Chinese hackers for hire tied to Bit9 and Aurora attacks
The existence, the modus operandi and details of successful campaigns of another Chinese hacking group have been revealed by Symantec researchers, who have managed to tie to …
Microsoft issued Fix it for actively exploited IE 0-day
Microsoft has yesterday unexpectedly released a security advisory warning users about instances of active exploitation of a vulnerability found in all supported versions of …
LynuxWorks releases a rootkit detection system
LynuxWorks announced the RDS5201, a new product to help detect the rootkit. Built on the LynxSecure 5.2 separation kernel and hypervisor, this small-form-factor appliance has …
Recommendations for strengthening cyber security policies
McAfee and the Digital Government Security Forum (DGSF) released a new report which explores the cyber risks confronting government and offers recommendations to mitigate …
Firefox 24 delivers 17 security updates
Mozilla released Firefox 24, which includes 17 security updates: seven are critical, four high, and six moderate. Fixed in this version: MFSA 2013-92 GC hazard with default …
USB “condom” protects from mobile device juice jacking
A group of Georgia Tech researchers has created quite a stir at this year’s Black Hat conference when they showcased chargers capable of installing malware on iPhones, …
Self-healing BIOS security from HP
HP announced HP BIOSphere with SureStart technology, a self-healing security solution created to help organizations better manage risk and protect user and IT productivity. HP …
Kaspersky Lab launches solution for multi-device security
Kaspersky Lab announced Kaspersky Internet Security – Multi-Device, a new security product that provides a way for customers to secure their Internet activity across …
Software for DIY data recovery, data protection and data destruction
Kroll Ontrack announced Ontrack EasyRecovery 11, a solution for DIY data recovery, data protection and data destruction. It includes new S.M.A.R.T. scan technology to monitor …
Mobile Pwn2Own: $300k prize pool awaits successful contestants
The next Mobile Pwn2own competition is to be held in November at the PacSec Applied Security Conference in Tokyo, and contestants can earn as much as $100,000 for a successful …
Too long passwords can DoS some servers
The discovery of a vulnerability in popular open source web application framework Django has recently demonstrated that using a long password is not always the best thing to …
30 Percent of transactions conducted from Tor are fraudulent
iovation announced that 30.2 percent of transactions conducted from Tor (the onion router) in August were fraudulent. This compared with an overall fraud rate of 1 percent for …
Featured news
Resources
Don't miss
- Is your password manager truly GDPR compliant?
- 7-Zip vulnerability is being actively exploited, NHS England warns (CVE-2025-11001)
- Exam prep hacked: Study tips and tricks that really work
- Stealth-patched FortiWeb vulnerability under active exploitation (CVE-2025-58034)
- Threat group reroutes software updates through hacked network gear