Please turn on your JavaScript for this page to function normally.
Chinese spies attempted to spear-phish US diplomats?

While some of the documents from the batch of US diplomatic cables dumped by WikiLeaks have proved to be more explosive than others, every now and then some nugget of …

Panda Antivirus for Mac Corporate Edition released

Panda Security launched Antivirus for Mac Corporate Edition, a solution for companies operating with hybrid computing environments, delivering complete protection against all …

63.7% of organisations plan a cloud investment this year

Only 36.3% of organizations are not planning any cloud investment, suggesting that previous fears of moving into the cloud may have abated, according to Ipswitch. Cloud …

Private info on Facebook increasingly used in court

Making the content of your Facebook account private can thwart the social network’s plan to share as much information possible with advertisers, but may not keep out …

Cisco unveils security specialist training and certifications

Cisco introduced new Security Specialist certifications to recognize individuals who have attained specific competencies critical to meeting demand for network security skills …

VLC 1.1.7 fixes security issue

VideoLAN unveiled VLC 1.1.7, a security update on 1.1.6. When parsing an invalid MKV (Matroska or WebM) file, input validation are insufficient. If successful, a malicious …

Cain & Abel 4.9.38 released

Cain & Abel is a password recovery tool for Microsoft operating systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted …

Expanding phishing vector: Classified ads

The online classified advertisement services sector has been increasingly exploited as a phishing attack vector by ecrime gangs, a trend confirmed by the growth of attacks …

Free guide: Web application security

Vulnerabilities in web applications are now the largest vector of enterprise security attacks. Stories about exploits that compromise sensitive data frequently mention …

Rogueware starts misusing names of legitimate AV

Rogueware authors have so far mostly avoided misusing names of legitimate AV software, and I often wondered why. My best guess is that they wanted to minimize the possibility …

Widespread “undelivered package” spam attack delivers Trojans

Cybercriminals are currently sending out the spam messages – which come attached with a malware infected .zip file – with titles such as “Post Express …

Governance has a central role in IT security

A major survey from ISACA confirms the central role that governance plays in information security within large organizations and stresses the fact that 95% of IT professionals …

Don't miss

Cybersecurity news