Chameleon-like fake AV delivered via clever social engineering
A very complex and likely very efficient fake AV spreading campaign has been spotted targeting Facebook users. It starts with users being apparently contacted by one of their …
Anonymous won’t publish stolen NATO documents
Following the arrest of 16 individuals in the U.S. and five in the U.K. and the Netherlands who are allegedly connected to the various cyber attacks organized by Anonymous, …
Hacking a mature security program
Most organizations are used to standard penetration tests. However, companies that have been increasing their overall security posture proactively through years of program …
New French eID card to tackle identity theft
Identity theft is a growing issue in many countries with 80,000 cases per year in France alone, according to the French Interior Ministry. For this reason the French National …
New book: Mac OS X Lion Pocket Guide
The Mac OS X Lion Pocket Guide is packed with concise and useful information in an easy-to-read format for users of all levels. It’s ideal for quick problem solving, and …
Cybersecurity risk management application for industrial control systems
Citicus has launched Citicus ICS, a new application to manage industrial process control risk. This enables organizations to identify and manage risks to SCADA and other …
Combat wire transfer fraud
The spread of internet malware and key logging software has led to an increase in sophisticated wire fraud schemes targeting customers of community financial institutions. In …
Apple Safari 5.1 increases security
Safari 5.1 includes improvements to performance, stability, and security. CFNetwork In certain situations, Safari may treat a file as HTML, even if it is served with the …
Deep Freeze Mac 5.0 released
Faronics released the newest version of its system-restore software, Deep Freeze Mac 5.0, to coincide with the launch of Mac OS X Lion. Deep Freeze Mac removes any …
Enhanced phishing methods on the rise
There’s been an increase in targeted and combined email-based threats, a new twist in phishing attacks, and an escalation in social engineering scams through popular …
Joomla 1.7.0 security release
Joomla 1.7.0. This is a security release. This is also the first release made within the new six-month release cycle that started with the delivery of Joomla 1.6 in January …
Guide for the Secure Software Development Lifecycle
(ISC)2 released of the “Official (ISC)2 Guide to the CSSLP“, a textbook that serves as the only official guide to the Certified Secure Software Lifecycle …
Featured news
Resources
Don't miss
- Building the missing layers for an internet of agents
- What security leaders should watch for when companies buy or sell a business
- Malicious Rust packages targeted Web3 developers
- Max-severity vulnerability in React, Node.js patched, update ASAP (CVE-2025-55182)
- Smart grids are trying to modernize and attackers are treating it like an invitation