Facebook scammers leverage the Amazon Cloud
Survey scams have been targeting Facebook users for longer that they would wish. The goal of all of them has always been to make users fill out survey, but the lures and …
Perplexing malware served on social welfare site
Legitimate compromised sites usually serve malware that directly or indirectly makes money for its peddlers, but ever now and then an exception to that rule arises. …
Unwanted apps on Android smartphones
Third-party Android markets have always been the favorite means of malicious app dissemination, especially in regions like Asia, where users don’t have access to the …
Protect sensitive data on Mac OS X, Windows and Linux
CoSoSys released EasyLock 2, their portable data protection solution. The enhanced new version offers full support for cross platform encryption between Windows, Mac OS X and …
A peek into the Sykipot campaigns
The group(s) behind the massive and consistent campaigns targeting US defense contractors with the Sykipot Trojan continue their attacks unabated, reports Symantec. Its …
Multi-cloud security groups
Dome9 Security added a new capability called Dome9 Security Groups – group-based firewall policy management – to its leading cloud security management service. …
Software platform for security in industrial control systems
Industrial Defender announced its new software product purpose-built for operators of automation systems, including NERC CIP-affected power utilities. Industrial Defender …
Protecting Mac OS X from privacy threats
SecureMac.com released PrivacyScan, a utility designed for people who value privacy and want to keep their online and offline experiences private. Every time you surf the web …
Ubuntu Unleashed 2012 Edition
Ubuntu Unleashed is filled with unique and advanced information for everyone who wants to make the most of the Ubuntu Linux operating system. This new edition has been …
Malicious MIDI files lead to rootkit malware
A Windows Media remote code execution flaw that has been patched in the last Patch Tuesday is being exploited by attackers in the wild to deliver malware to the targets’ …
Web attacks peak at 38,000 an hour
Web applications are subject to business logic attacks, according to a report by Imperva. Imperva monitored and categorized attacks across the internet targeting 40 different …
PoC exploits for Linux privilege escalation bug published
The publication of proof-of-concept exploit code for a recently spotted privilege escalation flaw (CVE-2012-0056 ) in the Linux kernel has left Linux vendors scrambling to …
Featured news
Resources
Don't miss
- Building the missing layers for an internet of agents
- What security leaders should watch for when companies buy or sell a business
- Malicious Rust packages targeted Web3 developers
- Max-severity vulnerability in React, Node.js patched, update ASAP (CVE-2025-55182)
- Smart grids are trying to modernize and attackers are treating it like an invitation