Continued attacks on social networks
GFI Software announced the top 10 most prevalent malware threats for the month of May 2011. The month was marked by a number of Facebook survey scams baiting users with offers …
Study examining the usage of hardware-based encrypting drives
The Trusted Computing Group (TCG) and Ponemon Institute released a full report on the perceptions about self-encrypting drives. The study interviewed 517 IT practitioners in …
Most organization experienced data loss
75% of UK organizations experienced data loss in the last year, compared with an average of 77% internationally, according to Check Point. Key findings from the survey show …
Cybercriminals targeting sporting events and music festivals
BitDefender identified a series of scams targeting music festival goers, sporting event fans and holidaymakers this summer. The top summer-themed spam messages for 2011 relate …
Forensic data capture and data extraction
Logicub announced the Talon Enhanced forensic data capture solution and the CellXtract data extraction solution for mobile devices. The Talon Enhanced provides fast data …
Citigroup admits breach, warns customers about phishing
Citigroup has finally made public the fact that it suffered a breach into its systems in May and that the names of some 200,000 customers, their account numbers and contact …
Plankton Android Trojan found in 10 apps on Android Market
Ten more applications have been pulled from the Google’s official Android Market following a notification that they contained a new kind of Android malware. The malware …
Admins of popular movie streaming portal arrested, site shut down
Kino.to, one of the most popular European movie streaming portals, has been shut down following coordinated raids executed by police officers in Germany, France, Spain and the …
French certification authority reveals its private key by mistake
Certigna, a major French certification authority whose certificates are trusted in all of today’s most popular browsers – IE, Firefox, Safari, Opera, and many …
Rustock still down, Microsoft pursues the botherders
Microsoft believes that the individuals behind the (still crippled) Rustock botnets are located in Russia, so it placed advertisements in the The Moscow News and the Delovoy …
Drupal Prepopulate Module vulnerabilities
Two vulnerabilities have been reported in the Prepopulate module for Drupal, which can be exploited by malicious users to conduct script insertion attacks and by malicious …
How search engine poisoning works
Imperva disclosed the intricate workings of a Search Engine Poisoning (SEP) campaign. The attack was extremely successful and continued to run for at least 15 months without …
Featured news
Resources
Don't miss
- Browser-in-the-Browser phishing is on the rise: Here’s how to spot it
- Enterprise security faces a three-front war: cybercrime, AI misuse, and supply chains
- Rakuten Viber CISO/CTO on balancing encryption, abuse prevention, and platform resilience
- Turning cyber metrics into decisions leaders can act on
- Teaching cybersecurity by letting students break things