Google+ related scams move to Facebook
Scammers continue to take advantage of the great interest raised by the introduction of Google+ and have begun tricking Facebook users into giving them access to their …
Mitigating software vulnerabilities
Microsoft released a new whitepaper that describes how exploit mitigation technologies can help reduce or eliminate risk, prevent attacks and minimize operational disruption …
Practical steps to improve your corporate security posture
Sony, Lockheed Martin, Nintendo, Groupon – In fact we could go on and on. Financial services, government agencies, health care records – It doesn’t matter. …
Trend Micro expands SecureCloud
Trend Micro SecureCloud, the encryption service with policy-based key management, has been expanded with a new offering designed for cloud service providers, as well as …
Apache Tomcat security bypass vulnerability
A security issue and a vulnerability have been reported in Apache Tomcat, which can be exploited by malicious, local users to bypass certain security restrictions or cause a …
Massive sentence for Wi-Fi hacking neighbor
The Kostolnik family’s nightmare is over – the neighbor that has hacked into their Wi-Fi network and misused the access for terrorizing them has been sentenced to …
Analyzing and dissecting Android applications for security defects and vulnerabilities
In March 2011, 58 malicious applications were found in the Android Market. Before Google could remove the applications from the Android Market they were downloaded to around …
Law enforcement supports new U.S. data retention bill
A new proposal for a U.S. federal law that would compel ISPs to retain logs regarding their customers for 18 months is currently being discussed in the House of …
Trend Micro Control Manager file disclosure vulnerability
A vulnerability in Trend Micro Control Manager can be exploited by malicious users to disclose sensitive information, according to Secunia. Input passed via the …
“Traffic ticket” spam email leads to scareware
A malicious email purportedly coming from the New York State Police is currently doing the rounds of inboxes and trying to scare people into opening and running the attached …
Credit card numbers stolen in Kiplinger breach
Kiplinger Washington Editors – the publisher of well-known business and economic publications such as the The Kiplinger Letter and the Kiplinger’s Personal Finance …
SSH client PuTTY 0.61 released
After four long years, here comes a new version of PuTTY, the popular free telnet/SSH client for Windows and Unix platforms. PuTTY 0.61 brings new features, bug fixes, and …