Please turn on your JavaScript for this page to function normally.
Security fix in Ruby on Rails 2.3.5

Ruby on Rails 2.3.5 was released over the weekend which provides several bug-fixes and one security fix. It should be fully compatible with all prior 2.3.x releases and can be …

Visualize network packets with Pkviz

Pkviz is a tool for plotting and cycling through and animating a series of network packets captured by tcpdump. What makes it unique is that the packets’ structure is …

Privacy and security: A fine balancing act

ENISA has just published a seven minute video overview of the recent NIS Summer School 2009. The short documentary follows up on the topic of this year’s event – …

Thanksgiving scams: Warming up for Christmas

Sometimes it is difficult to tell the difference between legitimate online offers and malicious spam. In this day and age, you can be pretty sure that financial and government …

Week in review: IE vulnerabilities, iPhone anti-virus and security threats for 2010

Here’s an overview of some of last week’s most interesting news, interviews and articles: Workers stealing data for competitive edge 85% of people admit they know …

iPhone anti-virus software: Has the time come?

Anti-virus software has already been made available for various mobile phones. Security firm F-Secure offers protection for phones with Windows Mobile and Symbian and …

Skype users targeted by Koobface look-alike

Trend Labs warn about a seeming Koobface variant – TROJ_VILSEL.EA – that targets Skype. It steals information from the user’s Skype profile: login …

Online banking security risks through European eID cards

A new paper by the European Network and Information Security Agency (ENISA) focuses on authentication risks with European eID Cards. It analyzes 7 vulnerabilities, identifies …

(IN)SECURE Magazine on the Amazon Kindle

Amazon’s coveted Kindle e-reader just got a firmware update that among other things, gives users the ability to read native PDF files. Naturally we had to investigate …

Macbook Air prize spam delivers malware

A good rule of thumb when it comes to unsolicited email offers or announcements should be: If it’s too good to be true, it probably is. Add to this grammatical and/or …

Cloud computing pros and cons

Cloud computing – what is it exactly and what benefits does it bring? A new white paper from ISACA describes how enterprises can achieve greater efficiencies and …

IE8 exposes sites to XSS attacks

It’s a little bit ironic when the thing that you put in place to protect you from certain attacks, it’s the thing that, in the end, makes you vulnerable to them. …

Don't miss

Cybersecurity news