Please turn on your JavaScript for this page to function normally.
iTunes 10.2 fixes multiple security vulnerabilities

iTunes 10.2 comes with several new features, improvements and security fixes. ImageIO libpng is updated to version 1.4.3 to address multiple vulnerabilities, the most serious …

Wireshark 1.4.4 released

Wireshark is a popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education. Wireshark 1.4.4 fixes the following vulnerabilities: …

SpyEye botnet activity surges

Fortinet announced its February 2011 Threat Landscape report, which details five zero-day vulnerabilities found in Cisco (FGA-2011-03), Adobe (FGA-2011-06) and Microsoft …

Cain & Abel 4.9.39 released

Cain & Abel is a password recovery tool for Microsoft operating systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted …

SANS Secure Europe: In-depth information security training

SANS Secure Europe Amsterdam is the second biggest event outside of the US offering 8 top level courses. What makes SANS Secure Europe Amsterdam a unique event is that these …

Workers expose businesses to malware and data loss

Organizations are at risk of malware as 76% of workers plug unknown USB flash drives into company PCs, potentially compromising corporate network security, according to …

Rootcager Trojan found on the official Android market

Free Android applications bundled up with malware have spilled over into the official Android marketplace. According to Symantec, the malware in question can root the phone, …

Scam e-mails can now be forwarded to the police

Action Fraud – the UK’s national fraud reporting centre run by the governmental National Fraud Authority – has recently set up a dedicated e-mail address to …

Twitter 11.6 hours survey scam spreading virally

Twitter users should be vigilant following the outbreak of a scam that is spreading links from users’ accounts without their knowledge. The scam, which has already …

PDF-Pro multiple vulnerabilities

Several vulnerabilities in PDF-Pro can be exploited by malicious people to compromise a user’s system, according to Secunia. 1. The application loads libraries (e.g. …

Man sentenced to 82 months for malware

A New Hampshire man was sentenced in federal court for his role in an international computer hacking conspiracy and his failure to file income tax returns while living in …

Growing focus on endpoint security

90% of business leaders are investing in resources to better manage the security of their endpoints, including servers, PCs and laptops, according to IBM. Over half of those …

Don't miss

Cybersecurity news