Phishers up their game
An unusually well crafted phishing site posing as the site of a well-known software company has been recently spotted by Symantec. Pushing software products at extremely …
Microsoft deems all DigiNotar certificates untrustworthy
Microsoft has updated Security Advisory 2607712, to announce that based on its investigation, it has deemed all DigiNotar certificates to be untrustworthy and have moved them …
Securely delete programs from your PC
Left over files belonging to uninstalled programs can lead to system errors and can even crash a PC. IObit’s new version of Uninstaller is an easy to use, free solution …
OpenSSL CRL bypass and ECDH DoS vulnerability
Two vulnerabilities have been reported in OpenSSL, which can be exploited by malicious people to bypass certain security restrictions and cause a Denial of Service, according …
Two new McAfee certification exams
McAfee today announced two new certification exams in support of the McAfee Security Certification Program. These exams have been released under the McAfee Certified Product …
Web Directories site leads to exploit kit and malware
Web Directories, a site designed to help webmasters and site owners find relevant directories, has been compromised and found redirecting its visitors to sites running the …
Sony hires new CISO
Sony Corporation announced that Philip R. Reitinger has been named Senior Vice President and Chief Information Security Officer, Corporate Executive in charge of global …
DigiNotar breach report reveals lousy security practices
An interim report issued by security audit firm Fox IT, who has been hired to investigate the DigiNotar breach, reveals that things are far worse than we were led to believe. …
OpenSSH 5.9 released
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0 implementation and includes sftp client and server support. It encrypts all traffic (including passwords) to …
Cloud-based DDoS protection
Imperva announced Cloud DDoS Protection, a secure cloud-based service that safeguards businesses from DDoS attacks. By subscribing to this service, organizations can protect …
A bid for the (ISC)2 board of directors: Beyond campaign promises
It’s been roughly two weeks since I started my petition as a write-in candidate for the (ISC)2 Board of Directors (BoD) elections. And what a two weeks it has been. As …
Iranian users were the ultimate target in DigiNotar compromise
If you needed a confirmation of Google’s claims that the rogue SSL issued by DigiNotar for *.google.com domains was used mainly to mount man-in-the-middle attacks …
Featured news
Sponsored
Don't miss
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days
- SSHamble: Open-source security testing of SSH services
- Traceeshark: Open-source plugin for Wireshark