New techniques for detecting hardware Trojans
Most Internet users know about the existence of software Trojans, but that of hardware ones is less known. They consist of integrated circuits that have been modified by …
Cybercriminals exploiting user inexperience
Noteworthy threats in October 2011 included the return of a rogue web browser, a phony hacking tool for Gmail account password recovery and malware disguised as advertisements …
Norman releases endpoint protection system
Norman released Endpoint Protection 9, which stops all kinds of malware threats including viruses, worms, trojans, spyware, adware, bots, zero-day threats and rootkits. …
FBI arrests six for DNS hijacking scam worth $14 million
Charges against six Estonian nationals and one Russian national for engaging in a massive and sophisticated Internet fraud scheme that infected with malware more than four …
Oracle Solaris 11: The first cloud OS
Oracle today released Solaris 11, the first Cloud OS. Oracle Solaris 11 is designed to meet the security, performance and scalability requirements of cloud-based deployments …
Bitdefender prevents scams on Twitter
Bitdefender is adding a tool to its arsenal to prevent scams on Twitter. Safego has emerged successful from beta testing by Twitter users and will be incorporated into …
New fuzzing platform from Codenomicon
Codenomicon released Defensics X, the latest version of their security and robustness testing software. The update introduces better coverage through infinite test case …
The 12 scams of Christmas
‘Tis the season for consumers to spend more time online – shopping for gifts, looking for great holiday deals on new digital gadgets, e-planning family …
Worldwide security service spending to reach $35.1 billion
Worldwide security services spending is on pace to reach $35.1 billion in 2011, up from $31.1 billion in 2010, according to Gartner. The market is forecast to total $38.3 …
DARPA invites white hats to help with U.S. cyber defense
The Defense Advanced Research Projects Agency (DARPA) is asking the government to ramp up its cyber research funding from $120 million to $208 million for 2012, and in the …
Global phishing trends and domain name use
A new survey by the Anti-Phishing Working Group (APWG) reveals that phishing attacks perpetrated against Chinese e-commerce and banking sites soared by 44 percent in the first …
Adobe patches Shockwave Player
Critical vulnerabilities have been identified in Adobe Shockwave Player 11.6.1.629 and earlier versions on the Windows and Macintosh operating systems. These vulnerabilities …
Featured news
Resources
Don't miss
- MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)
- OSPS Baseline: Practical security best practices for open source software projects
- Understanding the AI Act and its compliance challenges
- The art of balancing data security with business goals
- Debunking 5 myths about network automation