Bredolab botnet beheaded
Botnet takedowns have become a common occurrence this year, and the last one to be hit is Bredolab. Counting some 30 million bots and nearly 150 command and control centers, …
Iranian Cyber Army behind TechCrunch Europe hack?
Political hacking might give the perpetrators a sense of accomplishment and some personal satisfaction, but will rarely bring them money. Since they obviously already have the …
.com is the most dangerous domain
The world’s most heavily trafficked web domain, .COM, is now the riskiest, according to McAfee’s “Mapping the Mal Web” report released today. Fifty-six …
Fabric weaves security into program code
Wouldn’t it be wonderful if we could build security into a program as it is written? This idea spurred a number of researchers from Cornell University to try and develop …
Breaking web browsers
In the video below, Jeremiah Grossman, the founder and CTO of WhiteHat Security, talks about breaking web security. The video was recorded at the OWASP AppSec USA 2010 conference.
80% of firms don’t know who should secure cloud data
The cloud is still akin to the Wild West when it comes to the security of the data hosted there, according to Courion. In fact, 1 in 7 companies admit that they know there are …
One-touch secure access to corporate data
Check Point announced its new Mobile Access Software Blade that delivers fast and secure access to corporate email, data and business applications from mobile devices. It …
Twitter phish targets users with huge following
A link that will supposedly take users to a page where they can use a “mobile” version of Twitter has been popping up here and there in a number of chatrooms over …
Apple resolves FaceTime security flaw
A flaw in the beta version of Apple’s FaceTime for Mac which was presented on Wednesday, has apparently allowed potential hackers to gain access to and modify a …
Facebook users are voyeuristic while at work
There are several realities that typically fall outside of the approved enterprise communications mechanisms. These applications can enhance business responsiveness and …
Ubuntu Privacy Remix 10.04r1 released
Ubuntu Privacy Remix is a modified Live-CD based on Ubuntu Linux. UPR is not intended for permanent installation on hard disk. The goal of Ubuntu Privacy Remix is to provide …
Avalanche spam gang uses ZeuS to boost earnings
Reports that the world’s most prolific phishing gang have diversified their operations over from conventional phishing emails to distributing the ZeuS Trojan is another …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility