iTunes 10.2 fixes multiple security vulnerabilities
iTunes 10.2 comes with several new features, improvements and security fixes. ImageIO libpng is updated to version 1.4.3 to address multiple vulnerabilities, the most serious …
Wireshark 1.4.4 released
Wireshark is a popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education. Wireshark 1.4.4 fixes the following vulnerabilities: …
SpyEye botnet activity surges
Fortinet announced its February 2011 Threat Landscape report, which details five zero-day vulnerabilities found in Cisco (FGA-2011-03), Adobe (FGA-2011-06) and Microsoft …
Cain & Abel 4.9.39 released
Cain & Abel is a password recovery tool for Microsoft operating systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted …
SANS Secure Europe: In-depth information security training
SANS Secure Europe Amsterdam is the second biggest event outside of the US offering 8 top level courses. What makes SANS Secure Europe Amsterdam a unique event is that these …
Workers expose businesses to malware and data loss
Organizations are at risk of malware as 76% of workers plug unknown USB flash drives into company PCs, potentially compromising corporate network security, according to …
Rootcager Trojan found on the official Android market
Free Android applications bundled up with malware have spilled over into the official Android marketplace. According to Symantec, the malware in question can root the phone, …
Scam e-mails can now be forwarded to the police
Action Fraud – the UK’s national fraud reporting centre run by the governmental National Fraud Authority – has recently set up a dedicated e-mail address to …
Twitter 11.6 hours survey scam spreading virally
Twitter users should be vigilant following the outbreak of a scam that is spreading links from users’ accounts without their knowledge. The scam, which has already …
PDF-Pro multiple vulnerabilities
Several vulnerabilities in PDF-Pro can be exploited by malicious people to compromise a user’s system, according to Secunia. 1. The application loads libraries (e.g. …
Man sentenced to 82 months for malware
A New Hampshire man was sentenced in federal court for his role in an international computer hacking conspiracy and his failure to file income tax returns while living in …
Growing focus on endpoint security
90% of business leaders are investing in resources to better manage the security of their endpoints, including servers, PCs and laptops, according to IBM. Over half of those …
Featured news
Resources
Don't miss
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence
- Misconfig Mapper: Open-source tool to uncover security misconfigurations
- Why AI deployment requires a new level of governance