Please turn on your JavaScript for this page to function normally.
Is WordPress next in line for silent updates?

Silent software updates are still a topic of contention in the security world, but the successful implementation of the process by Google for its Chrome browser has definitely …

Did U.K. journalists use malware to spy on people?

The scandal that led to the demise of U.K. newspaper News of the World and to an investigation into the illegal methods used by journalists and editors in order to acquire …

Google+ related scams move to Facebook

Scammers continue to take advantage of the great interest raised by the introduction of Google+ and have begun tricking Facebook users into giving them access to their …

Mitigating software vulnerabilities

Microsoft released a new whitepaper that describes how exploit mitigation technologies can help reduce or eliminate risk, prevent attacks and minimize operational disruption …

Practical steps to improve your corporate security posture

Sony, Lockheed Martin, Nintendo, Groupon – In fact we could go on and on. Financial services, government agencies, health care records – It doesn’t matter. …

Trend Micro expands SecureCloud

Trend Micro SecureCloud, the encryption service with policy-based key management, has been expanded with a new offering designed for cloud service providers, as well as …

Apache Tomcat security bypass vulnerability

A security issue and a vulnerability have been reported in Apache Tomcat, which can be exploited by malicious, local users to bypass certain security restrictions or cause a …

Massive sentence for Wi-Fi hacking neighbor

The Kostolnik family’s nightmare is over – the neighbor that has hacked into their Wi-Fi network and misused the access for terrorizing them has been sentenced to …

Analyzing and dissecting Android applications for security defects and vulnerabilities

In March 2011, 58 malicious applications were found in the Android Market. Before Google could remove the applications from the Android Market they were downloaded to around …

Law enforcement supports new U.S. data retention bill

A new proposal for a U.S. federal law that would compel ISPs to retain logs regarding their customers for 18 months is currently being discussed in the House of …

Trend Micro Control Manager file disclosure vulnerability

A vulnerability in Trend Micro Control Manager can be exploited by malicious users to disclose sensitive information, according to Secunia. Input passed via the …

“Traffic ticket” spam email leads to scareware

A malicious email purportedly coming from the New York State Police is currently doing the rounds of inboxes and trying to scare people into opening and running the attached …

Don't miss

Cybersecurity news