No sexually explicit content in the office, please!
Symantec announced the publication of its September 2010 MessageLabs Intelligence Report, and the analysis reveals that 35 percent of remote and office-based workers who use …
All-in-one Wi-Fi cracking solution
ElcomSoft upgraded its Wireless Security Auditor and made it an all-in-one wireless cracking solution. It can automatically locate wireless networks, intercept data packets, …
The cookie that won’t go away
A proof-of-concept JavaScript API that manufactures persistent cookies and stores them in several types of storage mechanisms has been developed by security hacker Samy …
Software security testing – interest is high, security is low
In the past six months alone there have been multiple new zero-day vulnerabilities reported in Microsoft Windows and widely covered uneasiness about the security of mobile …
Theories about Stuxnet’s goal and authors abound
The quality of its code, the stolen certificates used to digitally sign it, the specifically targeted configuration, the four 0-day Windows vulnerabilities it exploits to …
Breakdown of security weaknesses by industry and organization size
WhiteHat Security released the tenth installment of its Security Website Security Statistics Report, providing a first-time breakdown of the state of website security by …
Trojan stealing private key certificates
As you may have already noticed, malware peddlers have realized that their wares have a greater chance of being loaded by the targeted system if they are digitally signed. The …
Cybersecurity tips for the enterprise
With the recent rise in malvertising, high-impact data breaches and other malicious security threats, the practices and secure infrastructure of legitimate marketers …
New software improves ability to detect malware in cloud-computing systems
Researchers from North Carolina State University have developed new software that offers significantly enhanced security for cloud-computing systems. The software is much …
A standardized format for cybercrime reporting
“Cybercrime is emerging as a very concrete threat. Considering the anonymity of cyberspace, it may in fact be one of the most dangerous criminal threats ever,” …
Phishers still favor spam over social networking sites
SpamTitan Technologies announced the findings of its latest survey of SMBs on the continued danger of phishing attacks, and it shows that despite media reports about the rise …
Trojan posing as installer wants your money
A Trojan masquerading as an installer for well-known applications such as DivX, μTorrent, LimeWire, Avast! Antivirus and others has been popping up on users’ …
Featured news
Resources
Don't miss
- North Korean hackers spotted using ClickFix tactic to deliver malware
- Sandworm APT’s initial access subgroup hits organizations accross the globe
- PAN-OS authentication bypass hole plugged, PoC is public (CVE-2025-0108)
- The UK’s secret iCloud backdoor request: A dangerous step toward Orwellian mass surveillance
- Over 3 million Fortune 500 employee accounts compromised since 2022