Email from disgruntled buyer leads to eBay phishing page
In these hard economic times, many have turned to eBay for selling things in order to earn a buck. But, in order to be trusted by buyers, the sellers depend on good ratings …
1,500 severe security events detected on Black Hat WLAN
The WLAN network at Black Hat was accessed by 3,155 attendees with a maximum of 904 simultaneous clients, detected and quickly contained a total of 1,561 severe independent …
Tumblr and Twitter users targeted with oddball spam messages
A bizarre spam campaign touting free McDonalds gift cards has recently been spotted on compromised Tumblr and Twitter accounts: According to GFI, the link included in the spam …
Wargame examines the future of US infrastructure
Booz Allen Hamilton concluded the first-ever wargame simulation examining creative infrastructure initiatives and solutions that factor in US transportation needs by the year …
Security storage app for iOS and Android devices
TrustPort launched Portunes, a freeware security storage app that runs on iOS and Android devices. Portunes is an application protecting sensitive data like informationon …
The Computer Incident Response Planning Handbook
The Computer Incident Response Planning Handbook is derived from real-world incident response plans that work and have survived audits and repeated execution during data …
Week in review: Hidden security risks of top mobile apps, Facebook invites white hats to attack its networks
Here’s an overview of some of last week’s most interesting news, articles and reviews: Penetration testing tool masquerades as surge protector In the same way that …
Researchers beat Google’s Bouncer
When earlier this year Google introduced Bouncer – an automated app scanning service that analyzes apps by running them on Google’s cloud infrastructure and …
Facebook invites white hats to attack its corporate network
Nearly a year ago, Facebook introduced its bug bounty program, inviting security researchers to poke around the site, discover vulnerabilities that could compromise the …
Personal and financial information under attack
Cybercriminals have increased their focus in targeting individuals and organizations of all sizes to steal personal and financial information according to Trend Micro. Among …
Most users think content is more important than the device
A global F-Secure survey of broadband subscribers has identified security, privacy and issues relating to the storing and sharing of digital content as key concerns. The …
Detect and shut down rogue mobile apps
To counter the emergence of malicious and unauthorized apps appearing on mobile app stores, RSA introduced the RSA FraudAction Anti Rogue App Service designed to detect and …
Featured news
Resources
Don't miss
- Threat actor leveraged Cisco SD-WAN zero-day since 2023 (CVE-2026-20127)
- Fake Zoom meeting leads to silent install of surveillance software
- SolarWinds Serv-U hit by four critical RCE-level vulnerabilities
- CISA flags exploited FileZen command injection bug, patch now! (CVE-2026-25108)
- Cyber valuations climb as capital concentrates, AI security expands