Underground toolkits will make cyber espionage easy
With the growing diversity of operating systems among companies, as well as the growing use of mobile devices, cybercriminals should have a very profitable 2011. Their tactic …
Advanced iPhone spy application
Mobistealth launched an advanced iPhone spy application which can be installed on any iPhone and runs completely in the background. The application is virtually undetectable …
Firefox 3.6.13 fixes many security issues
Mozilla released Firefox 3.6.13 that fixes several security issues. Miscellaneous memory safety hazards (rv:1.9.2.13/ 1.9.1.16) Mozilla developers identified and fixed several …
Deploy and remotely execute programs on Windows networks
RemoteExec for Windows is an agentless, encrypted software solution that allows IT pros to: Quickly and easily deploy MSI packages, Service Packs, patches, hotfixes, etc. …
New book: Troubleshooting Windows 7 Inside Out
You’re beyond the basics, so dive right into troubleshooting Windows 7 and really put your PC to work! Troubleshooting Windows 7 Inside Out describes hundreds of …
Increased illicit behavior on Internet pharmacies
Of the nearly 7,000 sites reviewed by the National Association of Boards of Pharmacy, only 4% of those online sites appear to be in compliance with pharmacy laws and practice …
Polyglot worm spreads via IM
A curious little worm has been spotted spreading via various IM applications – Skype, ICQ, MSN Messenger, Google Talk, and others. What is curious about it is that it …
Anonymous continues with DDoS attacks, possibly using a non-volunteer botnet
Anonymous – the hacktivist group that has become notorious for its DDoS attacks on websites of the RIAA, MPAA, and other anti-piracy organizations and companies – …
Facebook Mobile Privacy Dashboard gets an upgrade
Mobile Facebook users will soon have much more control over they privacy settings – they will be able to see what information they are sharing with which applications …
Fake Facebook toolbar leads to malware
It has become a predictable pattern – every time Facebook introduces some changes, malicious spammers start e-mail campaigns that try to take advantage of the news and …
Trojans dominate the threat landscape
As in recent months, Trojans dominated the threat landscape in November, according to GFI Software. Their data revealed that seven of the top 10 malware threats were …
Run Nmap on Android
Droidmap is an Android application for root users that implements some functions of Nmap in a GUI. This program comes with installer scripts for the installation of the …
Featured news
Resources
Don't miss
- Social data puts user passwords at risk in unexpected ways
- New observational auditing framework takes aim at machine learning privacy leaks
- Why password management defines PCI DSS success
- Hottest cybersecurity open-source tools of the month: November 2025
- Gainsight breach: Salesforce details attack window, issues investigation guidance