New vulnerability impacts Internet Explorer users
Microsoft is investigating new, public reports of a vulnerability in all supported versions of Internet Explorer. The main impact of the vulnerability is remote code …
Popular online services graded on SSL implementation
It seems that Firesheep has succeeded where similar tools have failed in the past: the issue of full end-to-end encryption for all websites – especially the most popular …
Perverted Facebook hacker targeted women
The recent arrest of a 23-year-old California man that has allegedly hacked e-mail accounts of more than 170 women and posted sexually explicit pictures found within them to …
New deep packet analysis technology
NetScout Systems announced Adaptive Session Intelligence (ASI) technology, a transformative real-time Deep Packet Analysis (DPA) engine that allows both enterprises and …
Google Android vulnerabilities
A shocking number of high-risk security flaws in Google’s Android smartphone OS have recently been discovered by security firm Coverity. “We found 88 high-risk …
Fake USAA e-mails phishing for card information
E-mails purportedly sent by the United States Automobile Association (USAA) have been hitting inboxes in the last few days, M86 researchers warn. In it, the recipients are …
Measure, visualize and understand WLAN clients
AirMagnet released n (including the AirMagnet Planner module) and AirMagnet WiFi Analyzer PRO 9.0. Both products now include the company’s new multi-adapter solution, …
End-to-end data security
RSA announced its RSA Data Protection Manager product which combines tokenization and application encryption, two popular application-based controls, with advanced token and …
Human rights organization targeted with cyber attack
The website of Survival International – a human rights organization that campaigns for the rights of indigenous tribal peoples – has been knocked offline last week …
The aftermath of the Bredolab botnet shutdown
The war against botnets will be long and hard – there is no doubt about it. For one thing, command and control centers can be replaced and the targeted botnet …
Fake AV pushers poison US election search results
The US midterm elections are taking place today, and scareware pushers aren’t sitting with their hands crossed – they have poisoned related search results: Search …
Protect login credentials with key stroke encryption
SutiSoft released SutiKSE, a security solution that protects data being entered on the keyboard. The solution helps protect against keylogging software and malware threats …
Featured news
Resources
Don't miss
- Popular code formatting sites are exposing credentials and other secrets
- Fake “Windows Update” screens fuels new wave of ClickFix attacks
- Microsoft cracks down on malicious meeting invites
- How an AI meltdown could reset enterprise expectations
- The breaches everyone gets hit by (and how to stop them)