Please turn on your JavaScript for this page to function normally.
Exploit code for still unpatched 0-day used by Stuxnet released

After Stuxnet hit, it was discovered that it took advantage of four previously unknown Windows zero-day vulnerabilities to spread and compromise targeted systems. Three of …

Bruce Schneier on cyberwar and cybercrime

In this video, Bruce Schneier examined the future of cyberwar and cyber security. He explored the current debate on the threat of cyber war, asking whether or not the threat …

How to stay safe while shopping online

While shoppers are looking for the hottest deals from online retailers to kick off their holiday shopping, cybercriminals are also looking to “score big” – …

Malaysian hacker breached Federal Reserve and DoD contractor networks

When agents arrested Malasyian Lin Mun Poo on account of selling US$1,000 worth of stolen credit card numbers just hours after he arrived in the U.S., they probably …

Google Apps Script API flaw allowed attacker to impersonate Google

Details about a recently discovered and exploited vulnerability that allowed a 21-year-old Armenian hacker to harvest GMail addresses and send to their owners a message coming …

Are malware hybrids the next big threat?

Recent encounters with hybridized malware files have left Trend Micro researchers wondering if they have been designed that way or if they are just an undesirable side effect …

Security, privacy and the generation gap

In the video below, Bruce Schneier talks about social networking sites and the future of privacy at the HEAnet National Networking Conference 2010 in Ireland.

Apple releases iOS 4.2

iOS 4.2 is available for download for iPad, iPhone and iPod touch. iOS 4.2 brings over 100 new features from iOS 4.0, 4.1 and 4.2 to iPad including Multitasking, Folders, …

10 tips for securely managing e-mail

“As an IT manager, looking after your company email can be a major headache. Being one of the primary portals for security threats and other IT issues, it is vital that …

Corporate laptops unprotected against theft or data loss

Over half of UK public and private sector organizations are at risk of data breaches, losses and leaks from portable PCs and devices, according to Check Point. A total of 52% …

NetBSD 5.1 released, security fixes abound

NetBSD 5.1 represents a selected subset of fixes deemed critical for security or stability reasons, as well as new features and enhancements. Security advisory fixes: …

Agnitio: Security code review tool

Agnitio is an application security tool developed by David Rook to help further the adoption of the Principles of Secure Development and to bring more repeatability and …

Don't miss

Cybersecurity news