Charlie Sheen is not dead, it’s a clickjacking scam
Charlie Sheen’s downward spiral is unfolding right under the public’s eye and has spurred many scammers to take advantage of the users’ interest in the …
10 scammers charged with running 419 scam
Ten people were arrested and are now facing charges of wire fraud in US federal court following a successful investigation that has them pegged as perpetrators of an advanced …
Malvertising attacks surge
Malvertising is on a significant rise, having doubled from Q3 to Q4 2010, according to Dasient. Based on Q4 estimates, three million malvertising impressions were served per …
Tough questions about botnets
ENISA published a comprehensive study on the botnet threat and how to address it. The report looks at the reliability of botnet size estimates and makes recommendations for …
“Facebook sponsored weight loss product” scam is back
The “Facebook sponsored weight loss product” scam makes a comeback on the social network and tries to lure its users with fake testimonial messages on their …
Google removes malicious Android apps with kill switch
After last week’s discovery of some 50+ malicious applications on the official Android Marketplace, Google has removed them as soon as they became aware of their …
Metasploit Pro 3.6 released
Metasploit brings an enhanced command-line feature set for increased proficiency and detailed PCI reports with pass/fail information for a view of compliance posture with PCI …
French government networks breached in search for G20 files
It seems that France is the latest country whose government computer networks have been targeted by malicious individuals with likely ties to the Chinese government. The …
Security framework integrates forensics and data auditing
AccessData announced the initial release of its new integrated security framework, CIRT (Cyber Intelligence and Response Technology), and is inviting select government and …
SonicWALL releases Continuous Data Backup 6.0
SonicWALL launched CDP 6.0 which automatically preserves and protects data assets against loss from file, device, and location based disasters. With support for Windows, Linux …
The importance of metadata to prevent data leaks
A new IDC report highlights how the widespread use of collaborative content technologies is fueling the aggressive growth of unstructured and semi-structured data. While …
Risk management cookbook
The Open Group Security Forum completed a major risk management initiative with the publication of the Cookbook for ISO/IEC 27005:2005 (registration required). The cookbook is …
Featured news
Resources
Don't miss
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence
- Misconfig Mapper: Open-source tool to uncover security misconfigurations
- Why AI deployment requires a new level of governance