Please turn on your JavaScript for this page to function normally.
Most users still vulnerable to attacks that exploit Java flaw

More than a week after Oracle released a critical patch for Java, more than 68% percent of Internet users are still vulnerable to attacks that exploit these vulnerabilities, …

Firefox extension makes social network ID spoofing trivial

A simple-to-use Firefox plugin presented yesterday at Toorcon in San Diego has hit the security world with the realization that squabbles about Facebook’s changing …

MySpace apps send user IDs to advertisers

In the wake of the discovery that some third party Facebook applications transmit users’ ID to ad agencies and Internet tracking companies, The Wall Street Journal has …

Riverbed acquires CACE Technologies

Riverbed Technology announced the acquisition of CACE Technologies, a leader in packet capture and analysis products for wireless and wireline networks and the corporate …

Week in review: Kaspersky hacked, Facebook privacy breach and the rise of Java exploits

Here’s an overview of some of last week’s most interesting news, interviews, articles and reviews: Facebook apps send user information to ad agencies Various …

A “private” banking Trojan competes with ZeuS

The recent surge of brand new banking Trojans continues to give us more things to worry about. The latest one is named “Feodo”, and it has been around for months …

Facebook works on solution to stop inadvertent user ID sharing

The recent discovery that various third-party application on Facebook were sending users’ ID numbers and/or names to advertising agencies every time the users click on …

RSYaba: Modular brute force attacker

RSYaba allows you to run brute force attacks against various services in a similar way to Hydra and Medusa. The tool is written in Ruby so modifying the scripts is a lot …

Fake MS Security Essentials peddles rogue AV products

I was wondering when will rogue AV peddlers start using the name of a real AV product, and now I have my answer. F-Secure has detected one called Microsoft Security Essentials …

Five tips for safe computer use

Panda Security released a list of the top five tips that computer users should follow to ensure a safe and secure online experience. With the exponential growth of social …

Open source cloud alternative

Open source cloud computing platform OpenStack announced the “Austin” code release of Compute and Object Storage. Since the project’s inception three months …

Adobe patches InDesign

An important library-loading vulnerability has been identified in Adobe InDesign CS5 7.0.2 and earlier, InDesign Server CS5 7.0.2 and earlier, and InCopy CS5 7.0.2 and …

Don't miss

Cybersecurity news