2011: Year of the hack
In a year that IT security experts have labeled the “Year of the Hack,” Bit9’s endpoint survey of 765 IT executives revealed that Advanced Persistent Threat …
Security risks with 10Gb/s networks
A new survey shows that senior networking, operations and security professionals in telecommunications, online services, retail, manufacturing and healthcare have serious …
SDK for universal 2D and 3D object recognition
Neurotechnology announced SentiSight 3.0, a Software Development Kit (SDK) for universal object recognition. The object recognition algorithms now enable an even broader range …
WebSurgery: Suite for security testing of web applications
WebSurgery is a suite of tools for security testing of web applications. It was designed for security auditors to help them with the web application planning and exploitation. …
Many parents unaware if cyberbullying is an issue
While 89 percent of parents said they talk to their children about proper Internet safety, 40 percent do not know if cyberbullying is an issue at their child’s school, …
vOperations Suite 4: Clarity for cloud operations
VKernel released vOperations Suite 4, designed to provide operational clarity for cloud operators and enterprise data centers. This release introduces full Hyper-V …
Google servers as a DDoS tool
Google’s servers can be used by cyber attackers to launch DDoS attacks, claims R00T_ATI, a penetration tester for Italian security consulting firm AIR Sicurezza. He …
Hurricane Irene scams hit Facebook
As predicted, Hurricane Irene-themed scams have begun spreading on Facebook. The one spotted by Trend Micro fraud analyst Karla Agregado lures users in by offering a chilling …
Morto worm spreads via RDP, brute-forces Administrator accounts
There’s a new worm in town and it’s the first one that spreads by taking advantage of the Remote Desktop Protocol (RDP). “Once a machine gets infected, the …
Prototype for first virtualized ATM
For nearly 20 years, onboard computing technology has been at the core of the ATM. But, Diebold is leveraging virtualization technology to introduce a prototype for the …
Fake Facebook friend request, now with hidden iFrame
A slight variation of last week’s Facebook friend request spam email campaign has been spotted targeting the social network’s users, and this one employs a …
Google search results much cleaner than in 2010
It used to be that among the first ten pages of search results for popular terms, up to 90 percent of the offered links would take the users to a malicious page serving …
Featured news
Sponsored
Don't miss
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days
- SSHamble: Open-source security testing of SSH services
- Traceeshark: Open-source plugin for Wireshark