Bogus AT&T notification leads to phishing
Another month, another bogus AT&T notification, warning recipients to verify their email accounts or they will have them suspended: But where previous fake emails …
Fake Apple Store discount card leads to identity theft
Bogus discount card offers purportedly coming from Apple and offering to recipients to buy a AU$100 worth in store credit for the small sum of AU$9 have recently been …
Free calculator: Duration of ISO 27001/ISO 22301 implementation
IS&BCA released a free calculator that will help you estimate the time needed for your ISO 27001 or ISO 22301 implementation. Since these two standards are equally …
DDoS attacks reach new level of sophistication
Prolexic Technologies warned of an escalating threat from unusually large and highly sophisticated DDoS attacks. The DDoS attacks have been launched in the last week using the …
Free USSD exploit blocker app
Avira released a free security app for Android phone users to protect them from remote USSD attacks. The Avira USSD Exploit Blocker app is available on Google Play. …
Contrast security plugin invisibly monitors applications during testing
Aspect Security announced Contrast, an application security service that creates a real-time dashboard of intelligence and vulnerabilities. Contrast is an IAST solution, …
Tool prevents hackers from obtaining Android app source code
RIIS announced HoseDex2Jar, a mobile security tool that can prevent Android decompilation by hackers on mobile devices. Android runs applications in .dex format. Dex2Jar is …
New wireless APs and 2-factor authentication products from Fortinet
Fortinet announced four new wireless access points along with three new two-factor authentication products. Fortinet is introducing four new additions to its wireless access …
Pen-testing Cookie Cadger continues where Firesheep left off
When the Firesheep extension was revealed to the world in late 2010, its developer said that his main goal was to get sites to switch to full end-to-end encryption, i.e. SSL. …
Visual Android Trojan as virtual theft aid
The rise of mobile malware in the last few years has been well documented, and the latest reports show that malware sending out text messages to premium rate numbers is the …
Oracle releases MySQL 5.6 RC
Oracle announced the availability of the Release Candidate for MySQL 5.6, the popular open source database. MySQL 5.6 RC provides enhanced linear scalability, helping users to …
White House Military Office breached by Chinese hackers
Following the recent confirmation by a senior intelligence officer with the U.S. Cyber Command that the Pentagon systems and networks are constantly under cyber attacks and …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground