RSA proactively blocks malware threats
RSA announced updates to its CyberCrime Intelligence Service designed to help enterprises monitor and harden their infrastructure against malware infection and data loss. This …
RealPlayer multiple vulnerabilities
Some vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user’s system, according to Secunia. 1. A …
Human Compromise: The Art of Social Engineering
This book teaches you the “how-to” of social engineering. Taking a hands-on approach, you will learn everything from the field-tested methods for reading body …
StealthWatch 6.1 adds internal and external monitoring capabilities
Lancope released a new version of its monitoring platform, the StealthWatch System 6.1. This version increases both the amount and types of flow data that can be processed by …
Integrated content-aware SIEM and firewall
NitroSecurity and Palo Alto Networks have integrated content-aware SIEM and next-generation firewall technology into a complete enterprise security solution designed to …
Researchers identify first flaws in the Advanced Encryption Standard
Researchers have found a weakness in the AES algorithm. They managed to come up with a clever new attack that can recover the secret key four times easier than anticipated by …
PoC keylogger app for smartphones revealed
We are all familiar with keyloggers – software that registers and identifies the keys pressed by a computer user – and its prevalently malicious uses. One of the …
Your name as a Google AdWord
It used to be that advertisers were forbidden from using proper names as Google AdWords, but not anymore. Forbes writer Kashmir Hill discovered that while searching her own …
Fraudster broke into bank accounts by using Facebook info
An English man has been been found guilty of siphoning money out of bank accounts after using social networks to guess the security questions for the account owners’ …
Mac OS X Lion 10.7.1 released
Apple unveiled the Mac OS X Lion 10.7.1 Update which is recommended for all users running OS X Lion. The update is only 17.4 MB for an iMac and requires you to reboot after …
Improvements to Google’s privacy policies
Following an audit at Google’s London office, the Information Commissioner’s Office (ICO) believes Google has taken reasonable steps to improve its privacy …
Internet bad neighborhoods
A significant part of current attacks on the Internet comes from compromised hosts that, usually, take part in botnets. Even though bots themselves can be distributed all over …
Featured news
Sponsored
Don't miss
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days
- SSHamble: Open-source security testing of SSH services
- Traceeshark: Open-source plugin for Wireshark