Please turn on your JavaScript for this page to function normally.
No sexually explicit content in the office, please!

Symantec announced the publication of its September 2010 MessageLabs Intelligence Report, and the analysis reveals that 35 percent of remote and office-based workers who use …

All-in-one Wi-Fi cracking solution

ElcomSoft upgraded its Wireless Security Auditor and made it an all-in-one wireless cracking solution. It can automatically locate wireless networks, intercept data packets, …

The cookie that won’t go away

A proof-of-concept JavaScript API that manufactures persistent cookies and stores them in several types of storage mechanisms has been developed by security hacker Samy …

Software security testing – interest is high, security is low

In the past six months alone there have been multiple new zero-day vulnerabilities reported in Microsoft Windows and widely covered uneasiness about the security of mobile …

Theories about Stuxnet’s goal and authors abound

The quality of its code, the stolen certificates used to digitally sign it, the specifically targeted configuration, the four 0-day Windows vulnerabilities it exploits to …

Breakdown of security weaknesses by industry and organization size

WhiteHat Security released the tenth installment of its Security Website Security Statistics Report, providing a first-time breakdown of the state of website security by …

Trojan stealing private key certificates

As you may have already noticed, malware peddlers have realized that their wares have a greater chance of being loaded by the targeted system if they are digitally signed. The …

Cybersecurity tips for the enterprise

With the recent rise in malvertising, high-impact data breaches and other malicious security threats, the practices and secure infrastructure of legitimate marketers …

New software improves ability to detect malware in cloud-computing systems

Researchers from North Carolina State University have developed new software that offers significantly enhanced security for cloud-computing systems. The software is much …

A standardized format for cybercrime reporting

“Cybercrime is emerging as a very concrete threat. Considering the anonymity of cyberspace, it may in fact be one of the most dangerous criminal threats ever,” …

Phishers still favor spam over social networking sites

SpamTitan Technologies announced the findings of its latest survey of SMBs on the continued danger of phishing attacks, and it shows that despite media reports about the rise …

Trojan posing as installer wants your money

A Trojan masquerading as an installer for well-known applications such as DivX, μTorrent, LimeWire, Avast! Antivirus and others has been popping up on users’ …

Don't miss

Cybersecurity news