48% of enterprises targeted by social engineering attacks
48% of enterprises have been victims of social engineering attacks, experiencing 25 or more such attacks in the past two years at a average cost of over £15,000 per …
“We are going to sue you” spam campaign leads to malware
Every once in a while, security researchers spot an email spam campaign so poorly thought out and executed that I have to wonder: “Who would fall far this?” But …
Researchers crack SSL encryption
Two security researchers have found a way of breaking the SSL/TLS encryption that allows the information that passes from browser/user to server and back be reliable and, …
Bluetooth vulnerabilities becoming easier to exploit
Codenomicon warns consumers about the poor quality and security of Bluetooth equipment. Based on Codenomicon’s robustness test results using smart model based fuzzing …
BackTrack adds RandomStorm WordPress scanner
RandomStorm’s WPScan, the free WordPress security scanner, has been added to the latest version of BackTrack. BackTrack is an open source operating system that provides …
Cisco security solutions for urban environments
Cisco announced a series of safety and security innovations powered by a Medianet architecture. Together these innovations support the evolution of Cisco’s strategy …
Pligg CMS multiple XSS vulnerabilities
Multiple vulnerabilities have been discovered in Pligg CMS, which can be exploited by malicious people to conduct cross-site scripting attacks, according to Secunia. 1. Input …
Micron SSD featuring self encryption
Micron Technology introduced a new version of its RealSSD C400, featuring self encryption. The C400 SED’s encryption capabilities are delivered through a hardware-based, …
Kaspersky One: Universal security for multi-device protection
Kaspersky Lab announced Kaspersky One, a “Universal Security” solution that ensures protection across a wide selection of platforms and devices. Using a single …
XSS bug in Skype iPhone app allows address book theft
A bug in the latest version of Skype for iPhone and iPod touch makes its users vulnerable to having their address book stolen just by viewing a specially crafted message, says …
Imation acquires IronKey’s security hardware business
Imation announced it will acquire the assets of IronKey’s secure data storage hardware business. The two companies also announced a strategic partnership whereby Imation …
Cisco collaborates with Microsoft for data center virtualization
Cisco is collaborating with Microsoft to deliver data center virtualization solutions designed to provide improved scalability and operational control of Microsoft Windows …
Featured news
Resources
Don't miss
- Critical Control Web Panel vulnerability is actively exploited (CVE-2025-48703)
- 18 arrested in €300 million global credit card fraud scheme
- PortGPT: How researchers taught an AI to backport security patches automatically
- AI can flag the risk, but only humans can close the loop
- VulnRisk: Open-source vulnerability risk assessment platform