Please turn on your JavaScript for this page to function normally.
Eight vulnerabilities fixed, one IE 0-day warning for Patch Tuesday

After last month’s mammoth Patch Tuesday release, administrators will be glad to know that this month Microsoft delivers only 2 bulletins that fix 8 vulnerabilities …

UK threatens to retaliate over cyber attacks

Rapidly approaching the point when retaliation against countries suspected of launching cyber attacks and engaging in cyber espionage will be ordered, the UK …

Log review checklist for security incidents

Anton Chuvakin, the well-known security expert and consultant in the field of log management and PCI DSS compliance and author of many books, and Lenny Zeltser, leader of the …

Email security trends

Proofpoint announced findings from a survey of 122 RSA Conference 2010 attendees, conducted at its exposition booth, about email security trends. Key findings from the survey …

Remote access app for iPhone and iPod touch

TeamViewer released TeamViewer and TeamViewer Pro iPhone. Designed for iPhone or iPod touch, from versions 2.2.1 and newer, the applications access or control remote Windows …

Mariposa bot distributed by Vodafone’s infected phone

Following yesterday’s news about the Energizer DUO USB recharger that infects PCs with a Trojan, here is another piece of equipment whose software comes bundled with …

Setting up a mobile botnet is alarmingly easy to do

The relative easiness of setting up a mobile botnet of nearly 8,000 phones has been demonstrated by Derek Brown and Daniel Tijerina at this year’s edition of the RSA …

“Highly critical” Opera vulnerability discovered

A highly critical buffer overflow vulnerability affecting the Opera browser has been discovered by Marcin Ressel of Secunia: The vulnerability is caused due to an error when …

Serious Apache vulnerability disclosed

A serious vulnerability in Apache’s HTTP web server that enables the attacker to gain remote access to the server and total control of a database, has been discovered by …

There is a social engineering scheme for everyone

The human factor is the weakest link of the security chain – this statement has been said and written so many times, that is starting to become a cliche’. Even so, …

Spear phishing aimed at high-value targets increases

Spear phishing aimed at high-value targets increases The Anti-Phishing Working Group (APWG) released its Q4, 2009 Phishing Activity Trends Report, which reveals that eCrime …

USB battery charger installs Trojan

The software that shows to which extent the battery is charged through the Energizer DUO USB recharger comes bundled up with a Trojan, says US CERT. The installer file for the …

Don't miss

Cybersecurity news