Google admits profiting from ads for illegal sites
You should know by now that the fact that Google is serving you an advertisement does not mean that it’s safe to click on it. Time and time again examples of malware …
Phishing emails from spoofed US-CERT addresses
US-CERT has issued a public warning about a phishing email campaign using spoofed US-CERT email addresses. “The subject of the phishing email is: ‘Phishing …
Smart network cloud application platform
NETGEAR announced its Smart Network Cloud Application Platform, a new technology platform that enables consumers to purchase and download apps from the cloud for their home …
Splunk Enterprise 4.3 released
Splunk Enterprise, a software for collecting, indexing and harnessing machine data, reached version 4.3. “All kinds of companies are using Splunk to harness the value in …
Key security developments for 2012
Kroll Ontrack, the leading provider of data recovery, electronic discovery, and information management products and services, today announced the most important technology …
IPAM and DNSSEC key management integration
The Thales nShield hardware security module (HSM) is now integrated with the Infoblox DNS platform to enable the deployment of DNSSEC. This joint solution addresses common …
The Linux Command Line
Thanks to user-friendly distributions like Ubuntu, more people are running Linux than ever before. But many users stick to the GUI and point and click their way through tasks, …
Microsoft releases seven bulletins
2012’s first Patch Tuesday has seven bulletins, including the postponed bulletin from December 2011 that addresses the BEAST style information disclosure. Talking about …
Police system compromised due to parental spying
The Patras program, used by the German Federal Police for surveillance and tracking of suspects and their vehicles via GPS, has recently been suspended for a while and its …
Android Trojan masquerades as phone optimizer app
As you may already know, Android users are at a much bigger danger of getting saddled with a malicious app than users using other mobile platforms – especially those …
Spam emails link to QR codes
It was just a matter of time, and now it’s happening. The Websense ThreatSeeker Network has started spotting spam messages that lead to URLs that use embedded QR codes. …
Recycled cybercrime tactics adapted to conceal fraud
GFI Software released its VIPRE Report for December 2011, a collection of the most prevalent threat detections encountered during the month. Phishing campaigns once again …
Featured news
Resources
Don't miss
- Unpatched Windows vulnerability continues to be exploited by APTs (CVE-2025-9491)
- CISA and partners take action as Microsoft Exchange security risks mount
- Shadow AI: New ideas emerge to tackle an old problem in new form
- AI chatbots are sliding toward a privacy crisis
- You can’t audit how AI thinks, but you can audit what it does