Please turn on your JavaScript for this page to function normally.
Reveal Facebook passwords stored in Web browsers

Logins and passwords to various Web resources are routinely stored or cached in Web browsers to speed up access to protected resources. While it is possible to extract cached …

Apple security update bypassed after 8 hours

It took only eight hours for the malware developers behind the MacDefender and its variants to come up with a way to bypass the security update pushed out by Apple. According …

Anti-evasion readiness test tool and service

Stonesoft today announced its anti-evasion readiness test service. This service tests how well an organization’s critical digital assets are being protected against …

Physical, logical and mobile authentication in one software

Entrust released IdentityGuard 10.0, which brings together security solutions for physical, logical and mobile access. This latest update to Entrust’s authentication …

US will consider cyber attacks as acts of war

The US is finally working on a formal strategy on how to deal with cyber attacks against its networks, systems or infrastructure, and so far it seems it is one that will …

Flashback: Encrypted backups for Android

Flashback provides encrypted backups to the cloud, giving you reliable access to your data along with the peace of mind that it’s secure. Flashback allows you to backup …

Auto-dialing Trojans migrate to Android devices

Auto-dialing malware has migrated from Symbian devices to Android ones, warns NetQin Mobile researchers. The Trojan has been spotted embedded in over 20 Android applications …

Employee-owned mobile devices are riskiest

More than half of information technology leaders in the US believe that any employee-owned mobile device poses a greater risk to the enterprise than mobile devices supplied by …

26 trojanized apps pulled from Android Market

26 applications containing a variation of the DroidDream Trojan have been found on the official Android Market and are believed to have been downloaded by at least 30,000 …

The most active first quarter in malware history

With six million unique samples of recorded malware, Q1 2011 was the most active first quarter in malware history, according to McAfee. The report revealed many of the trends …

Facebook users targeted with OS aware fake AV attack

Fake AV peddlers have begun using Facebook to drive traffic to the malicious site that tries to trick users into believing their computer is infected. With subject lines like …

Wireshark 1.4.7 released

Wireshark is a popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education. The following vulnerabilities have been fixed: …

Don't miss

Cybersecurity news