Five tips for safe computer use
Panda Security released a list of the top five tips that computer users should follow to ensure a safe and secure online experience. With the exponential growth of social …
Open source cloud alternative
Open source cloud computing platform OpenStack announced the “Austin” code release of Compute and Object Storage. Since the project’s inception three months …
Adobe patches InDesign
An important library-loading vulnerability has been identified in Adobe InDesign CS5 7.0.2 and earlier, InDesign Server CS5 7.0.2 and earlier, and InCopy CS5 7.0.2 and …
Fake Stuxnet removal tool wreaks havoc
The Stuxtnet Trojan hit the headlines pretty hard, and people around the world feared that their system was compromised, too. Among the legitimate Stuxnet removal tools that …
Sensitive prisoner data found discarded in dumpster
When a homeless couple went searching for recyclable things in a gas station dumpster in California last week, they probably didn’t expect to find files containing …
Pentagon to aid DHS in case of cyber attack on domestic soil
It is a well know fact that the U.S. Department of Defense is forbidden to deploy military units within the nation’s boarders for law enforcement purposes. The only …
Integrating Hydra with Nessus
The video below shows you how to integrate custom username and password dictionaries with Hydra to your Nessus scans.
Apple updates Java for Mac OS X 10.5 and 10.6
The latest Java updates from Apple deliver improved reliability, security, and compatibility. Java for Mac OS X 10.5 Update 8 supersedes all previous updates of Java for Mac …
FBI warns businesses about corporate account take overs
The FBI has issued a fraud advisory to warn businesses about the various bank fraud scams currently employed. Created by financial institutions, industry trade associations, …
The rise of the insider threat
The bank insider threat is on the rise. Patrick Romain, head of solutions in Barclays Information Security Group, calls it a “power threat” – obviously …
IBM improves cloud security
IBM unveiled a new security initiative focused on making cloud computing safer. IBM aims to help both users and providers of cloud computing more easily navigate security …
Global e-crime gang transitions to crimeware
The world’s most prolific phishing gang has completed a transition from using conventional phishing to massively propagating stealthy password-stealing crimeware that …
Featured news
Resources
Don't miss
- Why your security team feels stuck
- It’s time to give AI security its own playbook and the people to run it
- Kanvas: Open-source incident response case management tool
- 6 eye-opening books on AI’s rise, risks, and realities
- Check for CitrixBleed 2 exploitation even if you patched quickly! (CVE-2025-5777)