Please turn on your JavaScript for this page to function normally.
U.S. military drones hit by computer virus

An unnamed virus with a “keylogger” payload has been found in the computers used to operate U.S. Air Force’s Predator and Reaper remotely operated drones. …

Virus Bulletin news tweets spread malware

Malware peddlers are known for using news of unfolding events as lures to trick curious users into clicking on an offered malicious link. This practice is most often seen on …

163 new advanced evasion techniques discovered

Stonesoft announced it has delivered 163 new advanced evasion technique (AET) samples for global vulnerability coordination. The new samples include AETs over a number of …

Android VPN client launches via fingerprint authentication

AuthenTec introduced a security solution that combines VPN client security with fingerprint recognition for Android smartphones and tablets. The QuickSec Mobile VPN Client 2.0 …

Government telecommunication-spying malware opens backdoor

The Chaos Computer Club claims that a government-made “lawful interception” Trojan has abilities that exceed those allowed by the nation’s legislature and …

Most social networks users don’t keep up with privacy settings changes

The proliferation and usage of mobile devices is exponentially growing, as is consumers’ dependence on the Web, causing many to lose sight of the importance of keeping …

Week in review: Patching strategies, HTC Android privacy flaw, and how well do you know SSL?

Here’s an overview of some of last week’s most interesting news, videos, articles and podcasts: Serious disconnect between security perceptions and reality The …

Top DDoS attacks of 2011

There has been an increase in newer, intelligent application-layer DDoS attacks that are extremely difficult to identify “in the cloud,” and often go undetected …

MagicTree: Data management for penetration testers

Have you ever spent ages trying to find the results of a particular portscan you were sure you did? Or grepping through a bunch of files looking for data for a particular host …

Most trusted source for security training comes to London

In the last 12 months, we have seen a marked rise in hacktivism, financially motivated crime, and potentially state-sponsored cyber attacks. The range of targets has also …

Cloud-based anti-phishing software platform

FraudSense announced a public demo featuring its proprietary real-time anti-phishing detection algorithms. FraudSense identifies and disables fraudulent websites in real-time. …

Facebook scammers exploit death of Steve Jobs

PandaLabs detected a malicious link on Facebook that was being used to exploit the news of the death of Apple co-founder Steve Jobs. Just a few hours after Steve Jobs’ …

Don't miss

Cybersecurity news