CompTIA expands Security Trustmark Program
CompTIA expanded its Security Trustmark program to include two levels of the business accreditation, which identifies companies that follow industry-accepted best security …
Anonymous member charged with computer offences
Peter David Gibson, 22, has been charged with conspiracy to do an unauthorized act in relation to a computer, with intent to impair the operation of any computer or prevent or …
Zeus rival boasts of eluding tracker services, fails
Kaspersky Lab expert Jorge Mieres wrote yesterday about Ice IX – the first crimeware based on the leaked Zeus source code. “Ice IX Botnet is the first new …
Bogus emails delivering scanned documents carry malware
Emails posing as scanned documents sent from a Xerox WorkCentre Pro photocopier are again being sent out by malware peddlers, warns Sophos. This is not the first time that …
“Free Facebook Credits” scam
After a rather long time, Facebook users are again seeing offers of “Free Facebook Credits!” on their News Feed. Those users who are not aware of the fact that …
“Apache Killer” tool spotted in the wild
The developers behind the open source Apache Foundation issued a warning for all users of the Apache HTTPD Web Server, as an attack tool it has been made available on the …
The importance of data de-identification in the risk assessment framework
Dataguise highlighted recent research and analysis showing that de-identification through data masking is an important aspect of a company’s overall risk assessment …
KillSwitch technology catches brute-force attacks
Confident KillSwitch is an authentication technology that can identify and proactively defend against brute force attacks on account logins, password reset processes, …
Windows 7 Inside Out
Windows 7 Inside Out, Deluxe Edition is updated with 300+ new pages of information for working with Windows 7. This comprehensive reference to Windows 7 packs hundreds of …
Domscheit-Berg says WikiLeaks is lying, new batch of cables released
Following WikiLeaks claim that among the 3,500+ unpublished files destroyed by former WikiLeaks member Daniel Domscheit-Berg were a number of highly sensitive documents …
Install one Trojan, get three more
Downloader Trojans are often used by cyber crooks to thoroughly infect systems in order to extract anything that might be of value to them. Trojan.Badlib is a particularly …
PHP 5.3.8 fixes security issues
The PHP development team released PHP 5.3.8. This release fixes two issues introduced in the PHP 5.3.7 release: Fixed bug #55439 (crypt() returns only the salt for MD5) …
Featured news
Resources
Don't miss
- Google agrees to pay $135 million over Android data harvesting claims
- SolarWinds fixes critical Web Help Desk RCE vulnerabilities, upgrade ASAP!
- Open-source malware zeroes in on developer environments
- Hottest cybersecurity open-source tools of the month: January 2026
- A practical take on cyber resilience for CISOs