40th anniversary of the computer virus
This year marks the 40th anniversary of Creeper, the world’s first computer virus. From Creeper to Stuxnet, the last four decades saw the number of malware instances …
HoneyPoint Wasp: Monitor the security of Windows environments
MicroSolved announced a new version of HoneyPoint Wasp 1.50 which gives more capability to the security team to easily gain visibility into Windows systems and more power to …
Anti-phishing tool detects fraudulent sites by analyzing their elements
A Hong Kong City University professor that concentrates his effort on ways for combating phishing has recently made public a piece of software that proactively detects …
“Japanese Tsunami RAW Tidal Wave Footage” scam on Facebook
As the Japanese tragedy unfolds, so do the various online scams taking advantage of people’s interest in the situation. We have already witnessed black hat SEO poisoning …
Week in review: Poisoned Japan earthquake search results, open source exploit kit and new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news and articles: The importance of metadata to prevent data leaks A new IDC report highlights how the …
Pwn2Own: iPhone and Blackberry hacked
On the second day of the Pwn2Own contest held at the CanSecWest conference, iPhone and Blackberry devices have been successfully exploited, while the scheduled Android and …
Spoofed reported attack pages lead to ransomware
Spoofed reported attack pages have been the lure of choice of fake AV and ransomware peddlers for quite some time now, so it shouldn’t come as a surprise that a recent …
Japan earthquake search results already poisoned
It didn’t take long for malware pushers to take advantage of Internet users’ hunger for news and videos from Japan after it was hit today by the most powerful …
Google Android security tool found repackaged with malware
In a what should actually not be a wholly unexpected turn of events, the Android Market security update – pushed to Android users whose devices where affected by one or …
Best practices for identity theft services
With security breaches and identity theft cases frequently in the news, consumers are worried about becoming identity theft victims. Responding to this concern, dozens of …
Zeus toolkit with “ghost” panel for better evasion
The last version of the Zeus builder before author Monstr/Slavik gave up its source code to the author of the SpyEye toolkit is 2.0.8.9, and it’s still being offered on …
Should antivirus vendors block state malware?
The question was raised by security firm F-Secure after the news that documents found in the recently raided Headquarters of the Egyptian State Security revealed that its …
Featured news
Resources
Don't miss
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence
- Misconfig Mapper: Open-source tool to uncover security misconfigurations
- Why AI deployment requires a new level of governance