Free browser-based security assessment
Shavlik Technologies announced a new browser-based security advisory that helps identify potential security vulnerabilities on a network. Shavlik Security Advisor scans all …
Cloud-based protection for virtualized environments
Panda Security launchd Panda Virtual GateDefender Performa which delivers cloud-based protection for VMWare virtualized environments. Companies can now protect their perimeter …
Compliance is more than just cost
Compliance investments, which are basically treated only as a spending to align with compulsory regulations, when extended to all processes including privileged and super …
Sony suffers third breach, PSN still down
Sony’s troubles seem to have no end as the company confirms a third breach of their network and fails to set a date for the restoration of services. This last breach …
“Time spent on Twitter” scam spreads virally
Facebook users are already accustomed to practically daily offers of rogue apps that will supposedly show them who views their profile or allow them to use a similar feature …
Files uploaded to file hosting services accessed by malicious individuals
File hosting services such as RapidShare, FileFactory, Easyshare and others have a number of flaws that make it possible for unauthorized people to access and download files …
Xerox and Cisco partner to deliver cloud services
Xerox and Cisco intend to form an alliance to simplify IT management by delivering cloud-based services and technology solutions that combine network intelligence and print. …
Skype for Mac message processing code execution vulnerability
Pure Hacking, a group of ethical hackers in Australia, reported directly to Skype what they believed to be a zero-day vulnerability in Skype for Mac 5.x The vulnerability in …
New McAfee cloud security platform
McAfee announced the McAfee Cloud Security Platform, a new approach to helping organizations safely and efficiently take advantage of cloud computing. The new platform …
Week in review: Poisoned Google image searches, rogue Mac AV and a Java botnet in the wild
Here’s an overview of some of last week’s most interesting news and articles: Osama bin Laden spam invades Facebook Facebook ads are already spreading using videos …
Poisoned Google image searches becoming a problem
If you are a regular user of Google’s search engine you might have noticed that poisoned search results have practically become a common occurrence. Google has, of …
OpenID Attribute Exchange flaw
The OpenID Foundation has issued an alert for all sites using OpenID that don’t confirm that the information passed through Attribute Exchange – the service …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous