Multiple vulnerabilities in Cisco IOS
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to cause a DoS, …
Backup, deduplication and storage in one appliance
Symantec announced the NetBackup 5200 appliance series to help customers expand their data protection infrastructure with an easy to deploy, all-in-one hardware and software …
Dating site creates profiles based on information scraped online
Various publicly available information regarding all US citizen is likely to be aggregated and be made available by Gotham Dating Partners, according to an announcement made …
Banking Trojan incorporates legitimate remote control software
It seems that every technology made for “good” can be misused, and that also goes for software, apparently. An ESET researcher has recently received a sample of …
Toolkit merging Zeus and SpyEye already on the market?
When the alleged Zeus-SpyEye merger became news last October, a lot of people wondered what new capabilities we could expect of this new toolkit. According to McAfee’s …
Inside a banking Trojan drop-zone
There can be no doubt that cybercrime is on the rise. Compared to real-world crime, it is easier, often more profitable, and carries definitely less risk to the perpetrator. …
McAfee launches security certification program
The McAfee Security Certification Program is a global program consists of two “tracks”: The McAfee Certified Product Specialist track, which supports the McAfee …
10 security predictions for 2011
WatchGuard Technologies’ security analysts provide their 2011 security predictions: 10. “APT” becomes security acronym of the year – Heard of …
Facebook apps now allowed to harvest users’ address and mobile phone number
The latest step that Facebook took in the long process of eroding our privacy expectations happened on Friday. The social network announced on their Developer Blog that from …
Week in review: “Facebook closing” hoax, spam trends and third-party software vulnerabilities
Here’s an overview of some of last week’s most interesting news, videos and articles: Spam moving to social networks and mobile While at the moment it is not …
Ransomware continues to pose a threat
The great majority of cybercriminals is in it for the money. Some choose to steal it indirectly by using information-stealing malware to gain access to users’ online …
Former TSA employee sentenced for hacking agency’s databases
A former TSA worker has been found guilty and has been sentenced to two years in prison and a $60,587.07 fine to be payed to the TSA. He was accused of tampering with the …
Featured news
Resources
Don't miss
- Man vs. machine: Striking the perfect balance in threat intelligence
- Misconfig Mapper: Open-source tool to uncover security misconfigurations
- Why AI deployment requires a new level of governance
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests