Amazon users targeted with fake shipping notices
The BlackHole exploit kit has become an increasingly popular way of delivering malware to unsuspecting users. By exploiting a series of unpatched Windows, Java and Adobe …
Android Trojan used for political activism
In the overwhelming majority of cases, mobile Trojans are designed to steal money or information which will ultimately be monetized. But occasionally, there are some out there …
Kim Jong-il death spam carries malware
As expected, malicious spam taking advantage of the death of North Korean leader Kim Jong-il has been hitting inboxes since the news was announced. The emails contain a simple …
First EU report on maritime cyber security
ENISA published the first EU report ever on cyber security challenges in the Maritime Sector. This principal analysis highlights essential key insights, as well as existing …
OWASP ModSecurity Core Rule Set 2.2.3 released
ModSecurity is a web application firewall engine that provides very little protection on its own. In order to become useful, ModSecurity must be configured with rules. In …
Sophos enhances mobile device management platform
Sophos announced Mobile Control 2.0, a mobile device management solution that supports iPhones and iPads, Android phones and tablets, Windows Mobile devices and RIM BlackBerry …
Ransomware impersonating European police agencies
Ransomware has been around for quite some time and likely won’t disappear soon, as it usually does manage to make inexperienced users fork over to the criminals quite a …
Windows 8 will have picture password sign in
As much as security experts would like for it to be otherwise, experience has taught us that no matter how many times some people are lectured on the use of complex passwords, …
Latest spam campaigns delivering the Zbot Trojan
For a while now, fake messages and warnings from USPS, FedEx and DHL about supposedly undelivered packages have been hitting inboxes, and users have been getting wiser about …
Week in review: Multiple dimensions of corporate espionage, 2012 biggest security threats, and avoiding malware behind QR codes
Here’s an overview of some of last week’s most interesting news, podcasts and articles: Rise of unencrypted cards 71 percent of merchants were found to store …
Visa probes into potential card processor security breach
Credit card company Visa has announced that it has been informed of a potential data security breach at a European payment processor and that it has mounted an investigation …
How to avoid malware hiding behind QR codes
As the use of QR codes becomes increasingly widespread, users should be aware that they are also becoming an easy way for malware peddlers to spread their malicious wares. …
Don't miss
- Commix: Open-source OS command injection exploitation tool
- Review: The Chief AI Officer’s Handbook
- How QR code attacks work and how to protect yourself
- MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)
- OSPS Baseline: Practical security best practices for open source software projects