Most users still vulnerable to attacks that exploit Java flaw
More than a week after Oracle released a critical patch for Java, more than 68% percent of Internet users are still vulnerable to attacks that exploit these vulnerabilities, …
Firefox extension makes social network ID spoofing trivial
A simple-to-use Firefox plugin presented yesterday at Toorcon in San Diego has hit the security world with the realization that squabbles about Facebook’s changing …
MySpace apps send user IDs to advertisers
In the wake of the discovery that some third party Facebook applications transmit users’ ID to ad agencies and Internet tracking companies, The Wall Street Journal has …
Riverbed acquires CACE Technologies
Riverbed Technology announced the acquisition of CACE Technologies, a leader in packet capture and analysis products for wireless and wireline networks and the corporate …
Week in review: Kaspersky hacked, Facebook privacy breach and the rise of Java exploits
Here’s an overview of some of last week’s most interesting news, interviews, articles and reviews: Facebook apps send user information to ad agencies Various …
A “private” banking Trojan competes with ZeuS
The recent surge of brand new banking Trojans continues to give us more things to worry about. The latest one is named “Feodo”, and it has been around for months …
Facebook works on solution to stop inadvertent user ID sharing
The recent discovery that various third-party application on Facebook were sending users’ ID numbers and/or names to advertising agencies every time the users click on …
RSYaba: Modular brute force attacker
RSYaba allows you to run brute force attacks against various services in a similar way to Hydra and Medusa. The tool is written in Ruby so modifying the scripts is a lot …
Fake MS Security Essentials peddles rogue AV products
I was wondering when will rogue AV peddlers start using the name of a real AV product, and now I have my answer. F-Secure has detected one called Microsoft Security Essentials …
Five tips for safe computer use
Panda Security released a list of the top five tips that computer users should follow to ensure a safe and secure online experience. With the exponential growth of social …
Open source cloud alternative
Open source cloud computing platform OpenStack announced the “Austin” code release of Compute and Object Storage. Since the project’s inception three months …
Adobe patches InDesign
An important library-loading vulnerability has been identified in Adobe InDesign CS5 7.0.2 and earlier, InDesign Server CS5 7.0.2 and earlier, and InCopy CS5 7.0.2 and …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility