Apple patches vulnerabilities with new update
Apple released Security Update 2010-005 which increases the stability, compatibility, and security of your Mac. ATS A stack buffer overlow exists in Apple Type Services’ …
Novell releases Cloud Security Service
Novell announced the general availability of their Cloud Security Service which gives cloud providers the ability to deliver secure access and compliance in the cloud for …
Vulnerability research market grows
It is becoming increasingly evident that research on network security is crucial for the protection of critical telecommunications and computing systems. This is especially …
Video: Microsoft DLL hijacking exploit
This is a short video demo of the Microsoft DLL Hijacking Exploit on Windows 7 and office 2007.
Microsoft releases mitigating tool for latest 0-day bug
HD Moore, CSO at Rapid7 and creator of Metasploit, revealed last week that some 40 Windows applications are affected by a critical vulnerability that can allow attackers to …
Facebook scam: “I may never text again after reading this”
Sophos is warning Facebook users about a new scam that is spreading quickly across the social network claiming to be a link to an article: Despite similar scams over the past …
Businesses don’t improve security despite increased targeted threats
46 percent of U.S. SMBs have fallen victim to cybercrime, up two percent from last year’s Panda Security survey. The 2010 survey revealed there has been little to no …
New software for smarter security and compliance management
IBM announced new software to deliver security and compliance to thousands of computers globally – automating some of the most time-intensive IT tasks. The new software, …
The first cloud computing solution to achieve PCI compliance
Verizon Computing as a Service, or CaaS, the company’s cloud computing solution is the first cloud-based solution to successfully complete the Payment Card Industry Data …
Malware peddlers engaged in celebrity mass killings
Plane crashes and car accidents are the preferred methods of killing off celebrities in order to lure email recipients into opening a malicious attachment, Symantec reports. …
The dangers of insider threat
Whilst the media seems pre-occupied with the problems of cybercriminals causing problems for organizations from outside their network, a survey just published shows that 23 …
DEFCON survey reveals vast scale of cloud hacking
An in-depth survey carried out amongst 100 of those attending this year’s DEFCON conference in Las Vegas recently has revealed that an overwhelming 96 percent of the …
Featured news
Resources
Don't miss
- PAN-OS authentication bypass hole plugged, PoC is public (CVE-2025-0108)
- The UK’s secret iCloud backdoor request: A dangerous step toward Orwellian mass surveillance
- Over 3 million Fortune 500 employee accounts compromised since 2022
- CISOs and boards see things differently
- It’s time to secure the extended digital supply chain