VirtualBox 4.0.8 released
VirtualBox enables desktop or laptop computers to run multiple operating systems simultaneously, and supports a variety of host operating systems, including Windows, Mac OS X, …
Facebook survey scam with a twist
Facebook survey scams that lure in users with promises of being able to see who looks at their profile are nothing new, but here is one that has some unusual twists and merits …
Two teenage GhostMarket members sentenced
Two UK teenagers who stole credit card details from a number of online casinos, betting companies and web hosting companies and sold them on the now defunct GhostMarket have …
IBM Informix Storage Manager security bypass
A vulnerability has been reported in IBM Informix Storage Manager, which can be exploited by malicious people to bypass certain security restrictions, according to Secunia. …
Microsoft investigates the current threat landscape
Microsoft published volume 10 of the its Security Intelligence Report (SIRv10) which provides perspectives on software vulnerabilities, software vulnerability exploits, …
Google authentication protocol flaw endangers Android users
If you’re an Android user that has still not upgraded to the 2.3.4 and 3.0 version, you’re in danger of having the information contained in various Google …
New Alureon variant improves on old evasion techniques
The Alureon Trojan (also known as TDL, TDSS and Tidserv) has been around since 2007, and it’s function consist mainly in allowing the attacker to intercept incoming and …
VMware acquires Shavlik Technologies
VMware has entered into a definitive agreement to acquire Shavlik Technologies, which provides a portfolio of on-premise and SaaS-based management solutions that enable SMBs …
Trojan paves way for rogue defragmenter
You might have heard about rogue AV solutions and scareware, but not many people have experienced a rogue defragmenter that hides files and (indirectly) asks money to return …
Wikipedia-like sites peddling fake pharmaceuticals
Wikipedia is practically a household name now, so it’s no wonder that spammers are trying to take advantage of the online encyclopedia’s popularity and (relative) …
iPhone-enabled wireless multimeter
Redfish Instruments introduced the iDVM Digital Multimeter which wirelessly connects to an iPhone, iPad, or iPod Touch via an ad hoc wireless network allowing users to …
Breaches drive enterprises to prioritize access governance
Aveksa announced the findings of a recent survey conducted to examine how companies are re-evaluating their IT security measures following the recent security breaches at …
Featured news
Resources
Don't miss
- Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
 - How nations build and defend their cyberspace capabilities
 - Uncovering the risks of unmanaged identities
 - Deepfakes, fraud, and the fight for trust online
 - Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI