Please turn on your JavaScript for this page to function normally.
The 2010 threat landscape

The 2010 threat landscape In conjunction with their State of the Internet 2009 report, CA outlined their online security predictions for 2010. 1. Search engine optimization …

Serious SQL flaw could have compromised millions of Rockyou.com users

Imperva has issued a warning after finding a serious SQL injection flaw with Rockyou.com – a social networking application development web site. The SQL injection flaw …

World of Warcraft phishing scam

World of Warcraft (WoW) players should be on the lookout for phishing sites trying to get their user info. One still operating at time of writing is worldqfwarcraft.com. This …

Vendors deliver compromised products

Users should be aware of potential threats created by devices that are already compromised or tampered coming off the shelves. The Trend Micro 2010 Future Threat Report talks …

Week in review: Massive SQL injection attack, botnets, security trends and the Conficker worm

Here’s an overview of some of last week’s most interesting news, interviews and articles: Phishing campaign targets cPanel users Trusteer warned the customers of …

A closer look at ESET Online Scanner

ESET Online Scanner is a free online tool for detecting and removing malware from any PC by using only your web browser – there is no need to install anti-virus …

Do new technologies offer greater security?

Many administrators, IT directors, and CSOs are tired of the constant system patch battle and constant security software updates. The Google Chrome OS offers them hope for a …

Network IPS tests uncover appliance weaknesses

NSS Labs released its latest Network Intrusion Prevention System (IPS) Comparative Group Test Report for the fourth quarter of 2009. The report evaluates 15 NIPS products from …

Open source forensic framework

Mobius Forensic Toolkit is an open source forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing …

2009 in threats: Fake security software, search engines and social networks

The latest State of the Internet 2009 report by CA states that the most notable 2009 online threats were rogue/fake security software, major search engines, social networks …

Metasploit Framework 3.3.2 released

The Metasploit Framework is a development platform for creating security tools and exploits. The framework is used by network security professionals to perform penetration …

SQL injection attack claims 132,000+

A large scale SQL injection attack has injected a malicious iframe on tens of thousands of susceptible websites. ScanSafe reports that the injected iframe loads malicious …

Don't miss

Cybersecurity news