Critical vulnerability in Apple QuickTime
A highly critical vulnerability (as dubbed by security researchers from Secunia) affects the latest version of Apple QuickTime Player for Windows. “The vulnerability is …
Mariposa malware author arrested in Slovenia
A 23-year old Slovenian hacker that goes by the handle “Iserdo” has been arrested for developing the code that allowed the three alleged Spanish Mariposa botnet …
The cost of cyber crime
ArcSight and the Ponemon Institute announced the results of the First Annual Cost of Cyber Crime Study (registration required). Over a four-week period, the 45 organizations …
Secure cell phone conference calling
Cellcrypt announced that it has launched a secure conference service that provides both device authentication and voice call encryption to participants using popular cell …
Author of cloud-based phishing kit harvests collected credentials from phishers using it
People who embark on a life of crime are usually attracted by the promise of little effort and big money, and the hacker whose phishing kit was discovered to be collecting …
Exploitability data from real-time feeds
Qualys announced that QualysGuard Vulnerability Management now includes correlated exploitability information from real-time feeds to provide customers with up-to-date …
ZeuS, Sality, Chymine and Vobfus jump on the LNK vulnerability bandwagon
Stuxnet was only the beginning. The successful exploitation of the (still unpatched) Windows LNK flaw has prompted other malware attackers to try to achieve the same results. …
Facebook launches Safety page
Facebook recently passed the 500,000 user milestone, and the time has come to introduce a new addition to the already existing Facebook initiatives designed to keep users …
P2P increasingly favored by malware attackers
Cisco released its 2Q10 Global Threat Report, which is an aggregation of data and insights on threats from Cisco Security Intelligence Operations. The report merges the most …
PC surveillance software for Terminal Servers
Refog announces the release of Refog Terminal Monitor, a centralized software-based employee tracking system for the Terminal Server allowing administrators to track employee …
The impact of structural vulnerabilities on enterprise websites
Dasient released a new research report, “Structural Vulnerabilities on Websites: Why Enterprise Websites Are Vulnerable to Malware Attacks,” which found that, …
Fake ImageShack emails lead to Zbot variant
Emails pretending to be registration notifications from the popular free image hosting website ImageShack are hitting inboxes, and are trying to get the users to follow a link …
Featured news
Resources
Don't miss
- It’s time to secure the extended digital supply chain
- SysReptor: Open-source penetration testing reporting platform
- Microsoft fixes two actively exploited zero-days (CVE-2025-21418, CVE-2025-21391)
- 8Base ransomware group leaders arrested, leak site seized
- Apple fixes zero-day flaw exploited in “extremely sophisticated” attack (CVE-2025-24200)