Please turn on your JavaScript for this page to function normally.
Adobe patches Flash Player hole exploited in the wild

Adobe has released a security update for Flash Player for Windows, Macintosh, Linux and Android that address the object confusion vulnerability (CVE-2012-0779) that is …

Phishers mimic OpenID to steal credentials

New spam email campaigns are taking advantage of the users’ vague familiarity with the OpenID authentication method to phish their login credentials for a number of …

Situational awareness platform uses power of big data

Despite all the promises made by SIEM vendors over the last decade, enterprise security analysts often have no way to know if their IT systems have been compromised by an APT …

Windows applications on iOS

GraphOn announced its GO-Global iOS client. Available immediately as a free downloadable app from the App Store, the new client is used in conjunction with GraphOn’s …

NetShade 5: Anonymous proxy for the Mac

NetShade makes your presence on the web anonymous by routing your connection through a proxy server. It keeps you from leaving your digital “calling card” at every …

Theory of Computation

Offering an accessible approach to the topic, Theory of Computation focuses on the metatheory of computing and the theoretical boundaries between what various computational …

Week in review: Sizing up botnets, Conficker still alive and kicking, and a new exploit kit spotted in the wild

Here’s an overview of some of last week’s most interesting news, podcasts and articles: What’s in your daily slice of spam? Bitdefender decided to look at …

Walmart gift card scam targets smartphone users

Online survey scams are most often propagated through social network and sharing websites, but occasionally users are “assaulted” directly through their …

Microsoft to release seven bulletins, three critical

The Microsoft Security Bulletin Advance Notification for May 2012 contains 7 bulletins: three rated “critical” and the rest “important.” Just when most …

A new class of CISO is coming

A new IBM study reveals a clear evolution in information security organizations and their leaders with 25 percent of security chiefs surveyed shifting from a technology focus …

1,000+ WordPress sites compromised through automatic update feature

More than 1,000 WordPress blogs have been modified to redirect visitors to sites serving malware, affiliate and pay-per-click redirectors, and low quality PPC search result …

Microsoft names source of RDP code leak

Microsoft confirmed that, as speculated months ago, the RDP PoC exploit was sourced from China. It was apparent that the exploit originated in the West as researchers noticed …

Don't miss

Cybersecurity news