Please turn on your JavaScript for this page to function normally.
Multiple vulnerabilities in popular Web servers

When a file is created on a Windows system, a DOS-compatible 8.3 short file name (hereafter referred to as ‘8.3 alias’) is generated for backwards compatibility …

Automated malware analysis platform

HBGary released Responder Professional 2.0, a Windows physical memory and automated malware analysis platform that analyzes all programs in memory including malware to obtain …

Beyond the cloud: Common Assurance Metric

The Common Assurance Metric (CAM) launched today is a global initiative that aims to produce objective quantifiable metrics, to assure Information Security maturity in cloud, …

Phishing site spoofing secure login page

A phishing site masquerading as the secure login page of CenturyLink, the fourth largest local exchange telephone carrier in the US in terms of access lines, has been …

Zero-day vulnerabilities on the market

Zero-day vulnerabilities have become prized possessions to attackers and defenders alike. As the recent China-Google attack demonstrated, they are the basis on which most of …

Rogue software details: AntiSpyware

AntiSpyware is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Sensitive information retrieved from P2P networks

Security researchers Larry Pesce and Mick Douglas demonstrated on Friday – at this year’s ShmooCon security conference in Washington, D.C – the amazing …

Biggest Chinese hacker training site taken down

Black Hawk Safety Net, the biggest Chinese hacker training site, has been shut down by the police. The tally is: three people arrested; nine Web servers, five computers and …

Safer surfing mobile social networks

ENISA (the European Network and Information Security Agency) today presents a new report on accessing social networks over mobile phones which points out the risks and threats …

Week in review: cloud computing security, black hat hacking, identity theft

Here’s an overview of some of last week’s most interesting news, reviews and articles: Cloud computing not as safe as they want you to think Cloud computing has …

Can you trust Chinese computer equipment?

Steven J. Vaughan-Nichols, a blogger for IT World, raised the question, but before answering it, let’s take a look at the current backdrop that should affect the …

Infected Firefox add-ons pulled off official site

Two infected Firefox add-ons managed to avoid detection and were put online, available to download, on Firefox’s official add-on download site. The one thing that …

Don't miss

Cybersecurity news