The significant decline of spam
In October Commtouch reported an 18% drop in global spam levels (comparing September and October). This was largely attributed to the closure of Spamit around the end of …
Android Trojan with botnet capabilities found in the wild
A new, more sophisticated Trojan for Android devices has been spotting lurking on third-party Chinese Android app markets – the first ever piece of Android malware that …
WordPress 3.0.4 critical security update
Version 3.0.4 of WordPress is a very important update to apply to your sites as soon as possible because it fixes a core security bug in our HTML sanitation library, called …
GSM cracking is all about knowledge, not money
Since the cracking of GSM encryption back in December 2009 by encryption expert Karsten Nohl, the cost of setting up an operation that includes sniffing out the calls made by …
The dark side of Twitter
In this video, Paul Judge, chief research officer for Barracuda Networks, talks about measuring and analyzing malicious activity on Twitter. He talks about identifying the bad …
45TB of storage in a Linux NAS
Synology released the DS1511+, a five-bay NAS will accept up to two DX510 expansion units for a total of up to 15 drives. Using 3TB drives yields up to 45TB of storage. The …
Older Facebook apps threaten your and your friends’ privacy
Facebook users that are concerned with keeping their privacy have probably become more careful with the years about adding applications to their account, since many ask access …
Execution flow-based web application testing
In this video, Rafal Los, the Security Evangelist at HP, talks about web application security testing and offers a variety of practical tips. The video was recorded at the …
Geolocation, mobile devices and Apple top the list of emerging threats
McAfee unveiled its 2011 Threat Predictions report, outlining the top threats that researchers at McAfee Labs foresee for the coming year. The list comprises 2010’s most …
Security information and event management tips
As organizations continue to collect, process and store larger amounts of data from an increasing number of sources, costs related to system and staff resources are soaring. …
The secure coding practices quick reference guide
In the video below, Keith Turpin talks about the secure coding practices quick reference guide. It’s a technology agnostic set of general software security coding …
Man makes career out of suing e-mail spammers
There may be a lot people who thought about it, but there is one who decided to actually do it – Daniel Balsam from San Francisco quit his job and started his new …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility