Virus yearbook 2010: Mariposa, Stuxnet and MSNWorm most noteworthy
PandaLabs is closing the year with a look at some of the unique and noteworthy viruses that have appeared over the last twelve months. The list of viruses is vast and varied, …
The world of mobile security fears and escalating compliance
2010 was another year of living dangerously. Companies dealt with huge increases in malware threats, growing mobile security concerns about consumer devices such as iPads, and …
Using social networks to profile, find and own your victims
In this video from DojoCon 2010, Dave Marcus, the Director of Security Research at McAfee Labs, illustrates the dangers of doing unintelligent things online. Dave shows you …
Cisco AnyConnect: Secure network connectivity for Apple iOS
Cisco AnyConnect Secure Mobility Solution, available from the App Store, offers highly secure network connectivity from any Apple iOS 4.1 device, improving the productivity of …
Experimental botnet reveals long sought answers
Is there a better way of analyzing the ins and outs of a botnet than making one yourself? The answer to that question was negative for ESET’s researcher Pierre-Marc …
Upsurge of attacks aimed at Facebook, iPad and smartphones
If you thought 2010 was challenging, just wait for 2011. Below are our top five 2011 security predictions for the coming year from Websense: The Stuxnet sequels are coming, …
Free security tool detects vulnerable and outdated software
Secunia released version 2.0 of their Personal Software Inspector (PSI), a popular free security tool for home users that protects their personal and financial information …
Google doesn’t want to share its encryption keys
Two years ago, the wish to have control over communication systems and the lack of technical resources of Indian intelligence agencies has led to a particular request targeted …
Facebook scams soar
Facebook users should be careful about survey scams that are quickly spreading across the social network. Many Facebook users are struggling to clean up their accounts once …
How to keep mobile devices secure while traveling
“Tis the season to be jolly – and to leave sensitive corporate information behind at the airport! According to telephone interviews with the lost property offices …
Vendor creates malware to sell its anti-malware product
Chinese antivirus software companies seem to have a unusual strategy for keeping its services and products in demand – secretly developing threats themselves and …
Week in review: Gawker breach, social engineering and security predictions for 2011
Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: Gawker Media breach claimed by Gnosis The credit for the breach of …
Featured news
Resources
Don't miss
- Product showcase: Penetration test reporting with PentestPad
- Sensitive data of Eurail, Interrail travelers compromised in data breach
- PoC exploit for critical FortiSIEM vulnerability released (CVE-2025-64155)
- Microsoft shuts down RedVDS cybercrime subscription service tied to millions in fraud losses
- LinkedIn wants to make verification a portable trust signal