Please turn on your JavaScript for this page to function normally.
Anonymous hits US government contractor, law enforcement institutions

It has been a busy few days for hacktivist group Anonymous. On Friday they released some 400 MB of documents seemingly belonging to US government contractor Mantech, …

Conversation-spying Android Trojan in the wild

Android malware has so far been spotted doing things like sending text messages or making calls to premium service numbers, sending out information about the device and …

Arrested “Topiary” has a name, faces five charges

The alleged LulzSec member arrested last week by the e-Crime Unit of London’s Metropolitan Police on the Shetland Islands has a name: Jake Davis. He is 18 years old …

Facebook introduces bug bounty program

Facebook has decided to follow in Google’s and Mozilla’s steps and institute a bug bounty program rewarding the responsible disclosure of security vulnerabilities …

Week in review: Massive iFrame injection attack, Anonymous/LulzSec arrests and Facebook phishing

Here’s an overview of some of last week’s most interesting news and articles: Global analysis of 10 million web attacks Web applications, on average, experience …

Conficker found on external HD devices on sale

Australian supermarket chain ALDI might seem like the last place where one can pick up a Conficker infection, but according to an emergency security alert by the Australian …

“Wrong hotel transaction” spam bombards victims with malware

A particularly malicious spam run consisting of emails ostensibly sent by reception desk managers of various hotels has been targeting Visa users. The emails exhibit subject …

Web app security scanner Netsparker 2.0 released

Netsparker can crawl, attack and identify vulnerabilities in all custom web applications regardless of the platform and the technology it’s built on, just like an actual …

Norman antimalware appliance built on Linux platform

Norman announced the latest version of its Network Protection (NNP) antimalware appliance, which improves protection against persistent IT infrastructure security attacks. New …

IT control objectives for cloud computing

Cloud computing has become a major growth area in IT spending, and enterprises must adapt to the changes it brings to maximize the return on investment. To help organizations …

BT commanded to block site linking to pirated content

The verdict is in: British Telecom must block users from accessing the Newzbin 2 website, an aggregator of links to pirated movies and other content. The ruling could provide …

Use Google’s indexing capabilities to identify vulnerabilities

Next week at Black Hat, Stach & Liu researchers Francis Brown and Rob Ragan will show how the power of Google’s indexing capabilities can be harnessed to identify …

Don't miss

Cybersecurity news