ZeuS variants hide behind snatched certificates
Copying certificates from legitimate files and mimicking signatures from certificate authorities is certainly not a new tactic in the cybercriminals’ arsenal, but is one …
Remote monitoring tool for social networking activity
Awareness Technologies has expanded its WebWatcher monitoring tool for the social media platforms Facebook and MySpace. WebWatcher allows users to install the software and …
Top 5 undiscovered vulnerabilities found on enterprise networks
A report by Lumeta highlights the five most prevalent undiscovered or unknown vulnerabilities commonly found on enterprise networks. 1. Incorrect or incomplete deployments of …
Phishers target mobile phone users
Mobile phone users in the UK and Norway have been targeted by malicious emails purporting to come from their mobile service providers, claiming that the users have to confirm …
Win a copy of “Nmap Network Scanning” or “Hacking Exposed: Windows Forensics”
If you win, we will e-mail you on August 13. Our weekly newsletter is packed with information security news. You will receive it every Monday morning.
IP-based control over enterprise networks
Cloud Systems announced the release of atmospherics 2.3 which executes control of any networked infrastructure from any device with a web browser. Atmospherics 2.3 allows …
iPhone jailbreaking technique paves way for attacks
Since jailbreaking iPhones has been declared legal, security experts have been focusing on the techniques used and speculating about the fact that they can be used by …
Six arrested for compromising 10,000 online bank accounts
Six people have been arrested on suspicion of stealing credit cards, personal information and banking details as part of a suspected online banking fraud. On Tuesday 3 and …
Facebook woes of less careful users
Until Facebook manages to think of a way to head off various scams when they first appear, users should hone their skills of detection and teach themselves to refrain from …
AV vendors detect on average 19% of malware attacks
Traditional AV vendors continue to lag behind online criminals when it comes to detecting and protecting against new and quickly evolving threats on the Internet, according to …
Paranoid workers access corporate data on vacation
With bags packed, flights booked and foreign currency in their pockets the workforce might be jetting off but they’re definitely not leaving the daily grind behind. …
How Web frameworks kill traditional security scanning
In this video from OWASP AppSec Research 2010, Christian Hang discusses how web frameworks kill your static security scans.
Featured news
Resources
Don't miss
- The UK’s secret iCloud backdoor request: A dangerous step toward Orwellian mass surveillance
- Over 3 million Fortune 500 employee accounts compromised since 2022
- CISOs and boards see things differently
- It’s time to secure the extended digital supply chain
- SysReptor: Open-source penetration testing reporting platform