Security vulnerabilities of DVB chipsets
This video from Hack in The Box Amsterdam 2012 focuses on the security of audio and video MPEG streams broadcasted to subscribers via their set-top-boxes by a digital …
Microsoft acquires Perceptive Pixel
Microsoft and Perceptive Pixel announced that they have entered into a definitive agreement under which Microsoft will acquire PPI, a provider of multi-touch display …
Android Trojan attacks European banks
Recently Trusteer discovered the first Tatanga-based man in the mobile (MITMO) attack as well as new SPITMO configurations which are targeting Android mobile banking users in …
Restoring critical applications a top concern
Organizations now operate in a world where employees and customers alike expect critical services to be available and accessible at all times, and it’s forcing IT to …
Websense TRITON now with new malware and data theft defenses
Websense announced 10 new malware and data theft defenses, spear phishing protection with cloud sandboxing, and a forensic reporting dashboard with security intelligence. With …
WatchGuard updates XTM operating system
WatchGuard unveiled the latest release of the operating system that forms the backbone of WatchGuard XTM security solutions – WatchGuard Fireware XTM 11.6. In …
Bogus reminder about tomorrow’s meeting carries malware
Bogus emails warning users not to forget about a meeting scheduled for the next day have been hitting inboxes and trying to make the recipients download malware, warns Sophos. …
DarkComet RAT author ends the project
The DarkComet remote administration tool, which has recently been misused by the Syrian government to spy on its opponents, has reached the end of the line. “DarkComet …
MIT unveils a new Internet protocol for mobile clients
By exchanging TCP with UDP, two MIT researchers have managed to create the State Synchronization Protocol (SSP) – a new Internet protocol more suited to establishing and …
Free tool protects Internet connections from DNS Changer shutdown
Bitdefender released a tool to prevent computer users worldwide infected with DNS Changer malware from losing their internet connection on July 9th. The U.S. Federal Bureau of …
New Android Trojan secretly buys apps
Even though malicious Android apps can occasionally be found on Google Play, Chinese third-party online Android markets are known for offering them by the hundreds, if not …
Open source IDS Suricata 1.3 released
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. Several characteristics of …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)