Malicious ads lead to fake browser updates
Every now and then, malware peddlers employ the “Your browser is out of date, download the update here” approach to saddling inexperienced users with their …
Five priority areas for future U.S. homeland security focus
On the heels of the tenth anniversary of the creation of the U.S. Department of Homeland Security (DHS), Booz Allen Hamilton outlined five priority areas for the next decade …
Real-world cyber city used to train cyber warriors
SANS announced NetWars CyberCity, a small-scale city located close by the New Jersey Turnpike complete with a bank, hospital, water tower, train system, electric power grid, …
Most Americans uninformed about DDoS attacks
Whether motivated by an extreme form of free expression or criminal intent, distributed denial-of-service attacks (DDoS attacks) are increasingly commonplace worldwide. Yet …
Webroot adds anti-phishing to Web Security Service
Webroot announced the integration of anti-phishing capabilities into the Webroot Web Security Service, a cloud-based security service. The challenges in the detection of …
Fake Windows 8 key generators lurk in the wild
Users who are eager to try out the new Windows 8 but are not keen on buying it should be careful if searching for bootlegged copies or purported key generators online, Trend …
Fraud 101 for universities
“Colleges and universities are becoming more aware of the fraud threats they face, but there is still a lot of room for educating the educators,” says James Gifas, …
Dell updates cloud software for iPad and Windows RT
Dell announced enhancements to its PocketCloud app portfolio, which enables users to easily create a “personal cloud” to search, view, organize, and share content …
Xen Cloud Platform 1.6 released
Xen Cloud Platform is a virtualization platform for companies to create and manage virtual infrastructures for servers, desktops and clouds. XCP 1.6 strengthens its server …
Hardcoded account in Samsung printers provides backdoor for attackers
US-CERT has issued an alert warning users of Samsung printers and some Dell printers manufactured by Samsung about the presence of a hardcoded account that could allow remote …
Researchers finds 23 vulnerabilities in SCADA software
The recent revelation that Malta-based start-up ReVuln is offering only to paying customers information about SCADA zero-day vulnerabilities has spurred security researcher …
Piwik.org compromised, offered Trojanized version of analytics software
The official website of popular free web server analytics system Piwik has been compromised and made to serve a Trojanized version of the software that opens a backdoor on the …
Featured news
Resources
Don't miss
- Attackers exploiting WSUS vulnerability drop Skuld infostealer (CVE-2025-59287)
- How neighbors could spy on smart homes
- How the City of Toronto embeds security across governance and operations
- Hottest cybersecurity open-source tools of the month: October 2025
- OpenAI’s gpt-oss-safeguard enables developers to build safer AI