What’s in store for 2011? More scams and identity theft
Unemployment, economic uncertainty and the proliferation of technology will be factors in emerging types of fraud over the next year, according to the 2011 Identity Theft …
Security Factsheets: A new look at vulnerability data
Secunia today announced their Security Factsheets, designed for those who are interested in understanding the historical development of advisories and vulnerabilities in …
Search results for Mono Lake lead to malware
The recent discovery by NASA scientists of a bacteria that uses arsenic in its cellular structure has prompted a lot of people to search the Web for information about it and …
Minimizing virtualization risks
With its potential to reduce expenses, drive automation and provide flexibility, virtualization has earned its way onto the board agenda and is being implemented by …
First VoIP call from space
Cisco announced the results of the latest Internet Routing in Space (IRIS) testing, marking the first-ever software upgrade of an IP router aboard a commercial satellite while …
Secure your iPad with a lock
Since iPads have no security slot, it’s hard to protect them from theft. Mac Locks has solved this problem with the iPad Lock, the first and only iPad cable lock. The …
Fake Amazon receipt generator discovered
Above, you can see a vaguely optimistic VirusTotal user summary in relation to a file that’s been doing the rounds for about a month or two, according to GFI Software. …
Julian Assange arrested in London
WikiLeaks’ founder and director Julian Assange has been arrested this Tuesday morning at 9.30am (GMT) at a police station in London. According to a statement by the …
Snorby: Modern Snort IDS frontend
Snorby is a modern Snort IDS frontend. The basic fundamental concepts behind Snorby are simplicity and power. The project goal is to create a free, open source and highly …
Most businesses vulnerable to cache poisoning attacks
While DNSSEC adoption percentages appear to have increased dramatically by 340 percent this year, the actual number of zones that have been signed is very small: .02 percent, …
Tracking a pirated software license
When Avast Software spotted a license for its avast! Pro Antivirus software being distributed online, they decided to do a simple experiment – they didn’t take any …
Doorways on non-default ports make compromised websites harder to spot
Are negligent site and server administrators at least as much to blame for compromised sites that redirect users to doorway pages to pirated software as the cyber criminals …
Featured news
Resources
Don't miss
- Building the missing layers for an internet of agents
- What security leaders should watch for when companies buy or sell a business
- Malicious Rust packages targeted Web3 developers
- Max-severity vulnerability in React, Node.js patched, update ASAP (CVE-2025-55182)
- Smart grids are trying to modernize and attackers are treating it like an invitation