Coding error reveals RSA attackers operated from China
A simple error message returned by a server to which a malware sample was trying to connect revealed to Dell SecureWorks researchers the origin of the RSA attack, says Joe …
Free password reset self service solution for SMBs
Nervepoint Technologies announces the launch of Access Manager Self Service, a free Password Self Service solution for SMBs. With almost zero-configuration, the service …
Web application security on a new level
Qualys announced QualysGuard WAS 2.0, enabling organizations to leverage the power and scalability of the cloud to discover, catalogue and scan large numbers of web …
Cisco warranty CDs take users to malware site
Cisco has issued a warning about information packet and warranty CDs shipped to its own customers between December 2010 and August 2011, saying that they contain a reference …
“You look like you lost weight” Twitter scam
Direct Messages saying “You look like you lost weight in this video” are the latest approach used by cyber crooks to harvest Twitter login credentials, warns …
Automated malware analysis for businesses
GFI released GFI SandBox 3.4 (formerly CWSandBox), the latest update to their malware analysis tool that helps security professionals assess suspected files and URLs for …
Virtualized scanners and report customization for security assessment
Qualys announced a new edition of the QualysGuard Consultant service, featuring virtualized scanner appliances (vScanners) and a report customization module. The new edition …
Context-based Web UI ushers in Qualys’ new SaaS platform
Qualys showcased its new UI for the QualysGuard IT Security and Compliance SaaS Suite, now available in beta for all customers. The new context-based UI features interactive …
Microsoft offers $250,000 prize for innovative security technology
Microsoft may not believe in bug bounties, but it’s not adverse to paying for knowledge when it comes to ingenious defensive solutions. The company’s Trustworthy …
Call-recording Trojan is actually unethical app
The recently discovered Android Trojan that records actual phone conversations seems to represent a lesser danger than previously thought. For one thing, it isn’t hidden …
An epidemic of security worst practices
The majority of organizations fail to adhere to simple data protection standards and, in many cases, are fully unaware of what security practices are currently in place, …
Unprecedented state-sponsored global cyberattack revealed
The news that at least 72 government agencies, corporations and political organizations based all over the world have been targeted (and compromised) for over five years by …
Featured news
Resources
Don't miss
- January 2026 Patch Tuesday forecast: And so it continues
- How AI agents are turning security inside-out
- Security teams are paying more attention to the energy cost of detection
- Recently fixed HPE OneView flaw is being exploited (CVE-2025-37164)
- PoC released for unauthenticated RCE in Trend Micro Apex Central (CVE-2025-69258)