Please turn on your JavaScript for this page to function normally.
Facebook scam uses fake YouTube CAPTCHAs

It seems sometimes that Facebook survey scams alternate between just to types of lures: “See you views your profile” and “OMG! I can’t believe …

HADOPI stops monitoring for copyright infringement due to breach

Trident Media Guard – the company tasked by the French High Authority for the Dissemination of Works and Protection of Rights on the Internet to monitor P2P networks and …

New vulnerability reporting framework

The Industry Consortium for Advancement of Security on the Internet (ICASI) published of its Common Vulnerability Reporting Framework (CVRF) Version 1.0. CVRF is an XML-based …

Microsoft Forefront Endpoint Protection 2012 Beta released

Microsoft released Forefront Endpoint Protection 2012 Beta which continues to provide proactive protection against known and unknown threats using multiple technologies in the …

Mobile Encryption for iOS and Android

Sophos announced a number of new enterprise product lines that together offer protection anywhere and on any device. Sophos Mobile Control provides lightweight device …

VirtualBox 4.0.8 released

VirtualBox enables desktop or laptop computers to run multiple operating systems simultaneously, and supports a variety of host operating systems, including Windows, Mac OS X, …

Facebook survey scam with a twist

Facebook survey scams that lure in users with promises of being able to see who looks at their profile are nothing new, but here is one that has some unusual twists and merits …

Two teenage GhostMarket members sentenced

Two UK teenagers who stole credit card details from a number of online casinos, betting companies and web hosting companies and sold them on the now defunct GhostMarket have …

IBM Informix Storage Manager security bypass

A vulnerability has been reported in IBM Informix Storage Manager, which can be exploited by malicious people to bypass certain security restrictions, according to Secunia. …

Microsoft investigates the current threat landscape

Microsoft published volume 10 of the its Security Intelligence Report (SIRv10) which provides perspectives on software vulnerabilities, software vulnerability exploits, …

Google authentication protocol flaw endangers Android users

If you’re an Android user that has still not upgraded to the 2.3.4 and 3.0 version, you’re in danger of having the information contained in various Google …

New Alureon variant improves on old evasion techniques

The Alureon Trojan (also known as TDL, TDSS and Tidserv) has been around since 2007, and it’s function consist mainly in allowing the attacker to intercept incoming and …

Don't miss

Cybersecurity news