Critical Internet Explorer patch released
Microsoft released a security update that resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe …
First real-time security application for Facebook
Websense unveiled Defensio 2.0, a threat detection system for the social Web that analyzes and classifies user-generated content in real-time as it is posted to blogs and …
Banking Trojan coming at you from all sides
Using the very effective tactic of multiple attack vectors, the makers of the Zbot banking Trojan are ensuring a high enough infection rate for them to make profit. A recent …
Pharma spam on forums near you
Forever searching for new ways to accost naive shoppers, fake and/or illegal on-line pharmacy sites have lately taken to forcing their ads on unsuspecting forum visitors. …
Declining confidence in social networking security
Consumer awareness of phishing attacks has doubled between 2007 and 2009 and the number of consumers who reported falling prey to this attack increased six times during that …
Rogue software details: Windows Security Suite
Windows Security Suite is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Folders …
Encryption challenge worth $100K
News that am encrypted swiss army knife from manufacturers Victorinox remained uncracked – and a $100,000 prize went unclaimed – at the Consumer Electronics Show …
SASFIS Trojan treads lightly
The SASFIS Trojan variants may be not as famous and well-known as BREDOLAB’s or Zeus/Zbot’s, but they still pose a considerable danger to users and networks around …
Nmap 5.20 released
Nmap is a free and open source utility for network exploration or security auditing. Nmap 5.20 offers more than 150 significant improvements: 30+ new Nmap Scripting Engine …
Analysis of 32 million breached passwords
Imperva released a study analyzing 32 million passwords exposed in the Rockyou.com breach. The data provides a unique glimpse into the way that users select passwords and an …
Mac OS X Snow Leopard common criteria certification
Atsec information security announced the successful common criteria certification of Mac OS X Snow Leopard at EAL 3 (augmented for flaw remediation) with the Controlled Access …
Fear of stealth hackers
One of the biggest fears that software companies have is that someday hackers will manage to steal the source code of their products and modify it so that they can secretly …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage