US govt and military email addresses offered for sale
Cyber crooks are very well aware that information is a very lucrative commodity and that every type of information has potential buyers. Take email addresses, for example. …
Europeans targeted with new ransomware
In the last couple of years, malware that hijacks the users’ machines and demands money to “unblock” it has become an often encountered threat. Messages …
Fake LinkedIn emails serve malware
Emails purportedly coming from business-related social network LinkedIn have been hitting inboxes in the last couple of days, ostensibly reminding recipients of invitations …
Packet Guide to Routing and Switching
Go beyond layer 2 broadcast domains with this in-depth tour of advanced link and internetwork layer protocols, and learn how they enable you to expand to larger topologies. …
Week in review: Multifunction printer hacking, new protection mechanisms for IE 10 and most notorious Android malware
Here’s an overview of some of last week’s most interesting news, podcasts, articles and reviews: Multifunction printer hacking In this podcast, Deral Heiland talks …
Working exploit for MS12-020 RDP flaw found
The vulnerability in Microsoft’s Remote Desktop Protocol (RDP) implementation (MS12-020) – a patch for which has been released by during the last Patch Tuesday …
Android banking Trojan steals both authenticating factors
The Zeus and SpyEye banking Trojans have recently been fitted with a new module that targets Android users that use their device as an added authentication method when …
Fake Google Play site serves Android malware
Online scammers are known for their adaptability, so it should not come as a surprise that the recent name change of Google’s official Android Market – now dubbed …
Most notorious Android malware
Total Defense announced the findings of its 2011 Internet Security Threat Intelligence Report, which indicates Android’s rise in market share was only surpassed by the …
Are mobile password apps pointless?
ElcomSoft analyzed 17 popular password management apps available for Apple iOS and BlackBerry platforms, including free and commercially available tools, and discovered that …
Middle East plans to build a cyber-stronghold
The risks and consequences of cyber-attacks are increasing exponentially each day. The computers that control most of the world’s oil and gas production and distribution …
Wi-Fi hotspot testing simplified
Wi-Fi Hotspots are hot. From coffee shops, to airports, to sport venues, to gas stations and Laundromats, they’re springing up everywhere and are projected to grow 350 …
Featured news
Resources
Don't miss
- Microsoft releases urgent fix for actively exploited WSUS vulnerability (CVE-2025-59287)
- Microsoft blocks risky file previews in Windows File Explorer
- Building trust in AI: How to keep humans in control of cybersecurity
- Researchers expose large-scale YouTube malware distribution network
- Lanscope Endpoint Manager vulnerability exploited in zero-day attacks (CVE-2025-61932)