Security updates for Adobe Reader and Acrobat
Critical vulnerabilities have been identified in Adobe Reader 9.3.4 (and earlier versions) for Windows, Macintosh and UNIX, Adobe Acrobat 9.3.4 (and earlier versions) for …
Cryptome hacked, founder e-mail account ransacked
Cryptome.org, the well-known whisteblowing site, was hacked during this past weekend, and all of its content (approximately 7GB of data) was deleted by the hacker who then …
The rise of crimeware
Nearly two billion people today use the Internet and in doing so, expose themselves to an extensive and growing number of malware threats. CA researchers identified more than …
The persistence of Trojan attacks and scareware
GFI announced the top 10 most prevalent malware threats for the month of September 2010. Statistics show a staggeringly consistent attack primarily by the same Trojan horse …
WatchGuard gets virtual on security
WatchGuard released a virtualized version of their Quarantine Management Server. Used in conjunction with WatchGuard XCS content security appliances, the WatchGuard QMS …
Oracle buys Passlogix
Oracle acquired Passlogix, a provider of enterprise single sign-on (ESSO) solutions. Passlogix products help organizations improve and simplify security by enabling SSO for a …
Fake browser updates deliver fake AV or exploit kit
Not that long ago, Microsoft was warning users about rogue AV peddlers using compromised websites and fake browser warnings to urge them to download an …
Qualys acquires Nemean Networks
Qualys announced the acquisition of Nemean Networks,completed on August 31, 2010. This acquisition will expand Qualys’ research capabilities further into intrusion and …
Free iPhone rogue applications on Facebook
Sophos is warning Facebook users about messages currently circulating on the social network claiming that friends have received free iPhones. These messages, which have been …
Finding and managing SSL digital certificates
Digital certificates are now cornerstones to business technology. Located on servers, devices, networks and communication platforms, they represent a necessary security …
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Ever thought of using the time-tested tactics and techniques of a ninja to understand the mind of today’s ninja, the hacker? As a penetration tester or security …
Snort 2.9.0 released
Snort is an open source network intrusion prevention system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol …
Featured news
Resources
Don't miss
- Microsoft releases urgent fix for actively exploited WSUS vulnerability (CVE-2025-59287)
- Microsoft blocks risky file previews in Windows File Explorer
- Building trust in AI: How to keep humans in control of cybersecurity
- Researchers expose large-scale YouTube malware distribution network
- Lanscope Endpoint Manager vulnerability exploited in zero-day attacks (CVE-2025-61932)