Japanese tsunami videos lead to malware
A new Japanese disaster themed campaign is doing the rounds of inboxes. The e-mails supposedly offer links to videos about “The village that escaped the tsunami”, …
Rustock botnet downed by Microsoft
As many security companies and experts noted in the last few days, the activities of the Rustock botnet came to a standstill. They speculated about the reason behind this …
RSA hacked, SecurID users possibly affected
In an open letter, Art Coviello, the executive chairman of RSA (the security division of EMC), made public the fact that the company has suffered a breach and data loss …
EMC Avamar information disclosure weakness
EMC Avamar is a backup and recovery solution that utilizes data deduplication technology to identify redundant data at the source, minimizing backup data before it is sent …
PHP 5.3.6 fixes security issues
PHP 5.3.6 focuses on improving the stability of the PHP 5.3.x branch with over 60 bug fixes, some of which are security related. Security enhancements and fixes Enforce …
Google extends SSL to developer facing APIs
Firesheep‘s authors can be the satisfied with the gradual migration towards SSL that most of the biggest social networks, search engines, online shops and others have …
Low-tech approach to ATM heist
ATM thieves in San Francisco have adopted an unusual and very low-tech way of getting their hands on some money. According to The SF Examiner, they simply glue down the …
The crucial role of crypto technologies
Crypto technologies play a crucial role in data protection and compliance activities across a wide range of industry sectors, in both private and public organizations, …
Phishing HTML attachments bypass browser detection
In the constant war that goes on between online crooks and scammers and security professionals, adaptability is a quality greatly prized by all. All of them are tied together …
Japanese “miracle survival” Youtube scam clips
Online scams taking advantage of the ongoing Japanese tragedy are popping up daily. The latest one spotted is perpetuated on YouTube, where users go to search for videos that …
5 tips to avoid Japan earthquake and tsunami scams
Unfortunately many cyber crooks are exploiting the tragedy in Japan to get money for unsuspecting surfers. Here are tips from Enigma Software to make sure you don’t …
Battling with manual firewall analysis
In a survey by Skybox Security, 42% of respondents had more than 100 firewalls to manage, and 67% said they have firewalls from multiple vendors. In fact, 54% said their firm …
Featured news
Resources
Don't miss
- Faster LLM tool routing comes with new security considerations
- Your wearable knows your heartbeat, but who else does?
- How Lazarus Group used fake job ads to spy on Europe’s drone and defense sector
- Attackers target retailers’ gift card systems using cloud-only techniques
- Attackers turn trusted OAuth apps into cloud backdoors