Facebook backtracks on address and phone data sharing
It seems that enough people have objected to Facebook’s announcement about the imminent change regarding permissions for for address and mobile number that the social …
ICQ’s critical flaw allows attackers to serve malicious software update
ICQ – the popular instant messaging application – has a gaping security hole that can allow attackers to execute malicious code on the targeted system, says …
Microsoft releases Attack Surface Analyzer tool
Attack Surface Analyzer is the same tool used by Microsoft’s internal product teams to catalogue changes made to the operating system by the installation of new …
Unsecured IP cameras accessible to everyone
In the last couple of decades, we have become so accustomed to the idea that the public portion of our everyday life is watched and recorded – in stores, on the street, …
Vulnerabilities in the Boonana Trojan increase the danger
First spotted almost three months ago, the Boonana Trojan stood out because of its capability to infect both computer running Windows and those running Mac OS X. The Trojan …
A test of 13 intrusion prevention systems
NSS Labs released its network IPS comparative group test report for the fourth quarter of 2010. In the year since NSS Labs’ last IPS test, attackers have refined their …
Multiple vulnerabilities in Cisco IOS
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to cause a DoS, …
Backup, deduplication and storage in one appliance
Symantec announced the NetBackup 5200 appliance series to help customers expand their data protection infrastructure with an easy to deploy, all-in-one hardware and software …
Dating site creates profiles based on information scraped online
Various publicly available information regarding all US citizen is likely to be aggregated and be made available by Gotham Dating Partners, according to an announcement made …
Banking Trojan incorporates legitimate remote control software
It seems that every technology made for “good” can be misused, and that also goes for software, apparently. An ESET researcher has recently received a sample of …
Toolkit merging Zeus and SpyEye already on the market?
When the alleged Zeus-SpyEye merger became news last October, a lot of people wondered what new capabilities we could expect of this new toolkit. According to McAfee’s …
Inside a banking Trojan drop-zone
There can be no doubt that cybercrime is on the rise. Compared to real-world crime, it is easier, often more profitable, and carries definitely less risk to the perpetrator. …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous