Tsunami, a new backdoor for Mac OS X
Malware authors have taken an old piece of malware developed for Linux and have modified it to attack the Mac OS X platform, warns ESET. The OS X malware has been named …
Web application security vulnerabilities and strategies
The use of web applications has soared recently, due to the significant value they can add to enterprises by providing innovative ways to interact with customers. However, so …
First public cloud to support Solaris
CloudSigma announced the addition of Solaris to its cloud platform, making it the first major public cloud to support Solaris. Solaris supports more than 11,000 third-party …
1000 professionals are now CSSLP certified
(ISC)2 announced that over 1,000 professionals from 44 countries now hold its Certified Secure Software Lifecycle Professionals (CSSLP) certification. Application …
Cloud computing disaster recovery
Online Tech announced a disaster recovery solution for cloud computing. DR Now! replicates the entire hosted cloud including servers, software, network and security to an …
“So i googled your name” Twitter phishing scam
Some Twitter phishers prefer to scare or worry their targets into clicking on the offered link, others put their money on pure, unadulterated curiosity. The latest phishing …
Japanese Parliament’s computers infected, data stolen
As the investigation into the breach of Mitsubishi Heavy Industries’ networks discovered last month continues, internal sources have confirmed that sensitive and …
Infected MyBB release package offered for download
The development team of MyBB (MyBulletinBoard), a popular PHP and MySQL-based free forum package, warned its users about the fact that its latest version available for …
Secure file sharing app for iOS
Accellion Mobile Apps for iPad and iPhone with iOS 5 support provide secure mobile file sharing capabilities are currently available from the App Store. The Accellion Mobile …
The m00p gang investigation: a failure or a success?
Security companies and law enforcement agencies often collaborate on cyber crime investigations, and most of these investigations do end up with the arrest, prosecution and …
Facebook Lottery scam emails making rounds
Offline crooks have had a lot of success with the bogus lottery winning letter scam, so it should come as no surprise it is often “translated” into an email and …
GFI Software reaches into the cloud with Monitis acquisition
GFI Software has acquired Monitis, a provider of cloud-based network and systems monitoring solutions. This acquisition further strengthens GFI’s ability to provide …
Featured news
Resources
Don't miss
- MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)
- OSPS Baseline: Practical security best practices for open source software projects
- Understanding the AI Act and its compliance challenges
- The art of balancing data security with business goals
- Debunking 5 myths about network automation