Please turn on your JavaScript for this page to function normally.
Trojans dominate the threat landscape

As in recent months, Trojans dominated the threat landscape in November, according to GFI Software. Their data revealed that seven of the top 10 malware threats were …

Run Nmap on Android

Droidmap is an Android application for root users that implements some functions of Nmap in a GUI. This program comes with installer scripts for the installation of the …

Scammers preying on those wanting to adopt

The IC3 received information from law enforcement and complaints filed with the IC3 concerning an adoption scam. The scam is an attempt to collect personal information and …

Learn Cisco networking while playing a game

The Cisco CCENT Mind Share Game is a multimedia PC game that helps users acquire knowledge necessary for success on CCENT and CCNA exams. Featuring more than 75 stages, the …

Nessus in the cloud

The Nessus vulnerability scanner features high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of an …

Win a copy of Ninja Hacking!

We are giving away two copies of “Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques“. Throw traditional pen testing methods out the window …

Internet Explorer 9 promises protection from online tracking

Worried about third-party websites tracking your browsing history? Microsoft has a solution for you. The new version of Internet Explorer, which is due for release in early …

WordPress Comment Rating plugin CSRF vulnerability

A vulnerability has been reported in the Comment Rating plugin for WordPress, which can be exploited by malicious people to conduct cross-site request forgery attacks, …

WikiLeaks-related spam carries worm

Given the great attention that WikiLeaks’ releases of diplomatic cables is garnering around the world, it was only a matter of time when malware pushers were going to …

QuickTime 7.6.9 fixes security issues

Here is the security content related to QuickTime 7.6.9, available for download here. A local user may have access to sensitive information A filesystem permission issue …

Zeus targets major retailers

Trusteer recently discovered a Zeus botnet that is targeting credit card accounts of major retailers including Macy’s and Nordstrom just as the holiday gift buying …

Assange denied bail, WikiLeaks issues next batch of cables

Following his arrest yesterday, Julian Assange has been taken to hearing at City of Westminster magistrates court, where details of the charges laid against him have been …

Don't miss

Cybersecurity news