Ruby on Rails CSRF protection bypass vulnerability
There is a vulnerability in Ruby on Rails which could allow an attacker to circumvent the CSRF protection provided. The issue affects versions 2.1.0 and above and has been …
List of top e-threats points to computer use trends
BitDefender issued its monthly top 10 list of e-threats, which offers some insight into security and computer use trends. The list (for January) is as follows: 1. …
1 in 3 EU Internet users infected by malware
The EU has been at the forefront in leveraging IT advancements. The region has a high Internet penetration rate and over two-thirds of the population uses Internet. However, …
Facebook survey scam toolkit lowers entry bar for scammers
If you have been wondering about the recent proliferation of survey scams on Facebook and thinking to yourself how is it possible that so many people to know how to develop …
Say “I love you” with the Magic Blue Pill!
It is, after all, the season where we express to our loved ones just how much we care about, appreciate, and truly love them. Since the start of the month Websense Security …
Protected health information breach analysis
Redspin released an analysis of all protected health information breaches publicly recorded between August 2009 and the end of 2010, as per the interim final breach …
Stalker targets Zuckerberg through Facebook
Facebook wouldn’t be so popular if it wasn’t so useful, easy to use and fun, but as with everything else in this world, there are downsides to its use – most …
Injection attacks tutorial
This episode of the OWASP appsec tutorial series describes the #1 attack on the OWASP top 10 – injection attacks. The video illustrates SQL injection, discusses other …
Adobe Reader X critical vulnerabilities patched
Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and …
Web malware grew by 139 percent
Cisco’s latest global threat report reveals that Web malware increased by 139 percent in 2010 compared with the previous year. The rate of Web malware encounters peaked …
Mobile application security in the cloud
Rapid adoption of mobile devices and mobile apps as a critical part of an enterprise IT strategy has created a significant and unbounded security risk. Challenged to implement …
Network forensics platform Solera OS 5.0 released
Solera Networks announced Solera OS 5.0, a major update to its network forensics platform. The new OS transforms network forensics, addressing the prevailing urgency IT …
Featured news
Sponsored
Don't miss
- Roundcube flaws allow easy email account compromise (CVE-2024-42009, CVE-2024-42008)
- OpenWrt dominates, but vulnerabilities persist in OT/IoT router firmware
- Sports venues must vet their vendors to maintain security
- RustScan: Open-source port scanner
- Breaking down FCC’s proposal to strengthen BGP security