(IN)SECURE Magazine issue 29 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 29 has been released today. Table of contents …
Security concerns around “backdoor” mobile devices
Employee owned, “backdoor’ mobile devices entering the corporate network highlight ongoing security challenges with enterprise mobility, according to Mformation. …
Illegal online pharmacies target mobile users
Malware authors have begun to set their sights on mobile device users, as witnessed by the latest Trojans made for Android-running devices, on official and unofficial online …
Charlie Sheen is not dead, it’s a clickjacking scam
Charlie Sheen’s downward spiral is unfolding right under the public’s eye and has spurred many scammers to take advantage of the users’ interest in the …
10 scammers charged with running 419 scam
Ten people were arrested and are now facing charges of wire fraud in US federal court following a successful investigation that has them pegged as perpetrators of an advanced …
Malvertising attacks surge
Malvertising is on a significant rise, having doubled from Q3 to Q4 2010, according to Dasient. Based on Q4 estimates, three million malvertising impressions were served per …
Tough questions about botnets
ENISA published a comprehensive study on the botnet threat and how to address it. The report looks at the reliability of botnet size estimates and makes recommendations for …
“Facebook sponsored weight loss product” scam is back
The “Facebook sponsored weight loss product” scam makes a comeback on the social network and tries to lure its users with fake testimonial messages on their …
Google removes malicious Android apps with kill switch
After last week’s discovery of some 50+ malicious applications on the official Android Marketplace, Google has removed them as soon as they became aware of their …
Metasploit Pro 3.6 released
Metasploit brings an enhanced command-line feature set for increased proficiency and detailed PCI reports with pass/fail information for a view of compliance posture with PCI …
French government networks breached in search for G20 files
It seems that France is the latest country whose government computer networks have been targeted by malicious individuals with likely ties to the Chinese government. The …
Security framework integrates forensics and data auditing
AccessData announced the initial release of its new integrated security framework, CIRT (Cyber Intelligence and Response Technology), and is inviting select government and …
Featured news
Sponsored
Don't miss
- Roundcube flaws allow easy email account compromise (CVE-2024-42009, CVE-2024-42008)
- OpenWrt dominates, but vulnerabilities persist in OT/IoT router firmware
- Sports venues must vet their vendors to maintain security
- RustScan: Open-source port scanner
- Breaking down FCC’s proposal to strengthen BGP security