Please turn on your JavaScript for this page to function normally.
Fake Amazon smartphone shipping confirmation leads to malware

The gift-giving holidays are almost over, but shopping online is an all-year-round activity for many users and they are often warned to be careful when indulging in it. …

Cloud Computing: Automating the Virtualized Data Center

Cloud computing will revolutionize the way IT resources are deployed, configured, and managed for years to come. Service providers and customers each stand to realize …

Week in review: Stratfor breach, brute-forcing WAPs and an analysis of Facebook attacks

Here’s an overview of some of last week’s most interesting news: What’s in store for us in 2012 Looking forward into what lies ahead for us in 2012, Zscaler …

Microsoft releases MS11-100 for ASP.NET DoS attack

Today Microsoft released a security bulletin addressing a flaw in ASP.NET that was disclosed early morning yesterday at the Chaos Communication Congress (CCC) in Berlin. …

Brute-forcing wireless access points made easy

A design flaw in the WiFi Protected Setup that can allow attackers to easily brute-force their way into wireless network devices has been discovered and made public by …

Beware of password-protected documents carrying malware

Password-protected malicious attachments delivered via email are not a new occurrence – we have recently witnesses the tactic being used in the so-called Nitro attacks. …

Data-stealing Android Trojan masquerades as greeting-sending app

Text messages have largely replaced seasonal (and non) greeting cards, and there are mobile apps out there that let you send prewritten witty/sweet messages to friends and …

Analysis of Facebook attacks

Commtouch published a comprehensive analysis of scores of malicious Facebook activities during the past year. Affiliate marketing sites are the final destination in …

SCADA and PLC vulnerabilities in correctional facilities

Many prisons and jails use SCADA systems with PLCs to open and close doors. Using original and publicly available exploits along with evaluating vulnerabilities in electronic …

Microsoft provides protection for ASP.NET vulnerability

Microsoft published Security Advisory 2659883 to provide a workaround to help protect ASP.NET customers from a publicly disclosed vulnerability that affects various Web …

Emerging threats to become major players in 2012

Emerging threats from 2011 are on track to become the major players for cyberactivity in 2012, including mobile banking, “legal” spam and virtual currency. McAfee …

Mac management tools from Google

Google’s internal Macintosh Operations team is starting to release the utilities, tools, and scripts for managing and tracking a fleet of Macintoshes in a corporate …

Don't miss

Cybersecurity news