8 out of 10 applications fail to meet security standards
Considered “low hanging fruit” because of their prevalence in software applications, XSS and SQL Injection are two of the most frequently exploited …
Zero-day Adobe Reader flaw exploited in ongoing attacks
Adobe has issued a security advisory notifying users about a newly discovered and still unpatched vulnerability in Adobe Reader and Adobe Acrobat which has been spotted being …
Top 5 Android malware families
On November 15, Gartner issued a report that cited Google’s Android mobile operating system had reached a global 52.5% smart phone market share, while iOS trailed in …
Personal information of 3.5 million poker players leaked
Personal data of some 3.5 million users of the Ultimate Bet poker website have been made available for download on an online forum for a short time. The data included the …
Fake Verizon notification carries malware
A sneaky spam email campaign aiming to infect users with a banking Trojan is currently underway and is targeting mobile carrier customers, warns Microsoft. The email purports …
Patch management integration with Nessus
Tenable Network Security announced that Nessus and SecurityCenter now integrate with top patch management solutions.: Red Hat Network Satellite Server, Microsoft Windows …
Proactive detection of cyber security incidents
ENISA today launched a report which identifies 16 shortcomings in detection of network security incidents. The report reveals that not all available tools are used widely …
CloudVerse: Cloud management framework
Cisco introduced CloudVerse, a framework that combines the foundational elements needed to enable organizations to build, manage and connect public, private and hybrid clouds. …
AuthenTec acquires PeerSec Networks
AuthenTec has acquired PeerSec Networks, a provider of networking security solutions. The PeerSec Networks team and complete product portfolio, which includes the Matrix …
Fraudsters beat two-factor authentication, steal $45k
It seems that two-factor authentication solutions that deliver verification codes to mobile phones are not as foolproof as one might think – a lesson that an Australian …
Facebook bug allows users to access private photos
A bug tied to Facebook’s “Report/Block” process can be misused to access uploaded photos of people who have chosen not to share them publicly, says a poster …
U.S. wakes up to cybercrime threat
Businesses in the U.S. are increasingly waking up to the threat of cyber crime according to the latest Lloyd’s Risk Index, but evidence shows the problem of cyber crime …
Featured news
Resources
Don't miss
- Commix: Open-source OS command injection exploitation tool
- Review: The Chief AI Officer’s Handbook
- How QR code attacks work and how to protect yourself
- MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)
- OSPS Baseline: Practical security best practices for open source software projects