Please turn on your JavaScript for this page to function normally.
Critical vulnerability in Sun Java

ACROS Security has discovered a vulnerability in Sun Java, which can be exploited by malicious people to compromise a user’s system, according to Secunia. The …

MS Security Center search results poisoned

You would think that the Microsoft Safety and Security Center is the one place where you would be safe from malicious links, and you would be wrong. According to GFI’s …

U.S. to consider a new, secure Internet

While Iran thinks about instituting a national Internet in order to minimize the “poisoning” of Iranian minds with Western ideas and culture, the U.S. is toying …

An examination of malware ecosystems

Malware delivery networks are typically hosted across multiple sites and are responsible for launching dynamic attacks on unsuspecting users. A new Blue Coat report examines …

U.S. government-funded labs targeted by cyber attacks

It’s safe to say that successful U.S. companies, government facilities and military contractors are by now to aware that they should always be on the lookout for cyber …

Can the Google .co.cc ban be effective?

Google has recently decided to block all pages hosted on the .co.cc domain from appearing in its search results, and the move has sparked discussions. The search giant has …

“Casey Anthony confession video” scam spreads

The verdict in the high-profile Casey Anthony case has ultimately disappointed a lot of people who believe that she did kill her two-year-old daughter, and scammers have …

Law enforcement winning the battle against cybercrime

June was a difficult time for cybercriminals as it saw some notable successes for various law enforcement agencies in the war on cybercrime, according to Kaspersky Lab’s …

New voice identification technology

Neurotechnology introduced VeriSpeak, a new voice identification technology, available in the VeriSpeak SDK and as a new voice identification. VeriSpeak combines voiceprint …

CentOS 6.0 released

CentOS 6.0 for i386 and x86_64 architectures is now available. It is based on the upstream release EL 6.0 and includes packages from all variants. All upstream repositories …

Metasploit: The Penetration Tester’s Guide

The free and open source Metasploit Framework is the most popular suite of penetration testing tools in the world, with more than one million downloads yearly. Metasploit: The …

Week in review: Washington Post Jobs site and Fox News Politics Twitter account breached

Here’s an overview of some of last week’s most interesting news, reviews and articles: Breached Fox News Politics Twitter account announces Obama’s death A …

Don't miss

Cybersecurity news