VLC 1.1.5 fixes Windows vulnerability
The VLC development team introduced VLC 1.1.5, the sixth release of the 1.1.x branch of VLC. This release focuses on minor features, bugfixes and security issues: …
Will ears replace fingerprints as a form of ID?
Fingerprint checks and iris scans may be the most popular ways of biometric identification for the time being, but it looks like they might soon be joined – if not …
Security preparations for IPv6 migration must start now
The arrival of a slew of new and upgraded operating systems, smartphones and tablets that are enabled for IPv6 has the potential to open new and unrecognized security …
Top 10 security threats for 2011
Imperva announced their predictions for the top ten security trends for 2011 which have been compiled to help IT security professionals defend their organization against the …
Lethic Trojan is back, uses same stolen digital certificate as Stuxnet
Some two months ago, the world found out about the Stuxnet – the worm that used the Windows .lnk file vulnerability in order to spread through removable drives of …
Week in review: Firesheep countermeasure tool, Facebook bug and Barracuda bug bounty program
Here’s an overview of some of last week’s most interesting news, articles and reviews: Firesheep countermeasure tool BlackSheep Zscaler researchers have created, …
Palin e-mail hacker sentenced
After a number of delays, former University of Tennessee student David Kernel has finally received his sentence for compromising Sarah Palin’s Yahoo! e-mail account back …
Millions stolen in ATM fraud
Two executives of an automated teller machine dispensing company are currently waiting to be sentenced in a case of fraud perpetrated against Connecticut’s Domestic …
Interim findings of first EU cyber exercise
The interim findings and recommendations of EU Member States participants of the 1st Pan-European Cyber Security Exercise indicate that Cyber Europe 2010 was a useful cyber …
Free antispam for Linux mail servers
BitDefender released Free Antispam for Linux Mail Servers, aimed at small businesses and individuals who run mail servers in environments other than Windows but are …
Panda Cloud Internet Protection 3.2 released
Panda Cloud Internet Protection 3.2 includes monitoring and control of P2P protocols, even when encrypted, and protection for exploitable browser vulnerabilities. It also …
Nessus vulnerability scanner 4.4.0 released
The Nessus vulnerability scanner features high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security …
Featured news
Resources
Don't miss
- Treating MCP like an API creates security blind spots
- Offensive cyber power is spreading fast and changing global security
- Enterprise password audits made practical for busy security teams
- What zero trust looks like when you build it step by step
- Social data puts user passwords at risk in unexpected ways