WordPress users endangered by Trojanized plugins
Three popular WordPress plugins have been Trojanized by unknown individuals and made available for download, warned WordPress yesterday. “Earlier today the WordPress …
IT data management now a major enterprise initiative
Evolving requirements for leveraging IT information have led to the emergence of IT data management (ITDM) as a major enterprise initiative, according to LogLogic. They also …
SAP NetWeaver multiple vulnerabilities
Some vulnerabilities have been reported in SAP NetWeaver, which can be exploited by malicious people to conduct cross-site scripting attacks, disclose sensitive information, …
Portable Microsoft endpoint for secure cloud computing
SPYRUS announced Secure Pocket Drive, the first and only licensed device that boots Microsoft’s mobile, flagship operating system, Windows Embedded Standard 7, from an …
McAfee enhances security management solution
McAfee announced enhancements to their security management solution, providing automated and real-time security and risk analytics to proactively identify, assess, manage and …
Firefox 5 fixes security and improves browsing
Mozilla released Firefox 5.0 that fixes several security issues, stability issues and introduces new features. Privacy-aware users will be happy to learn that the Do-Not-Track …
Certification authority reports security breach
Another certification authority has fallen prey to attackers in need of certificates for phishing authentication pages. The authority in question is StartSSL, operated by …
Dropbox security glitch allowed anyone to access user accounts
Web-based file hosting service Dropbox has confirmed that a bug introduced by a code push allowed anyone to access any user account by simply typing in a random password for a …
ICANN domain expansion could increase phishing
The ICANN board gave final approval to what some are calling “the most dramatic change to the Internet in four decades” allowing the expansion of new Top-Level …
Metasploit 3.7.2 adds 11 new exploits
Metasploit is a free, open source penetration testing solution. Metasploit now ships with 698 exploit modules, 358 auxiliary modules, and 54 post modules. 11 new exploits, 1 …
Japan criminalizes malware creation and distribution
The Japanese parliament has finally passed a law that punishes malware creators and distributers – and even people who acquire/store malware – with jail time and a …
Android URL Filtering SDK: Secure Web browsing and compliance
Commtouch announced GlobalView URL Filtering for Mobile, which enables real-time protection for mobile device users browsing the Web. GlobalView URL Filtering is comprised of …
Featured news
Resources
Don't miss
- PortGPT: How researchers taught an AI to backport security patches automatically
- AI can flag the risk, but only humans can close the loop
- VulnRisk: Open-source vulnerability risk assessment platform
- Connected homes: Is bystander privacy anyone’s responsibility?
- Google says 2026 will be the year AI supercharges cybercrime