Firefox 0-day compromises visitors of Nobel Peace Prize website
The official site of the Nobel Peace Prize has been compromised by using a malicious PHP Script, and has been found serving malware by taking advantage of a Firefox zero-day …
Boonana Trojan for Mac OS X spreads via social media
SecureMac has discovered a new Trojan horse in the wild that affects Mac OS X, including Snow Leopard (OS X 10.6). The Trojan horse, Trojan.osx.boonana.a, is spreading through …
Computer pranks that simulate Trojan infections are invading the Web
As Halloween approaches, applications, fake websites, spam and Trojans all put on a disguise to try to trick users. PandaLabs has been detecting attacks like these since …
Most Americans support an Internet kill switch
Sixty-one percent of Americans said the President should have the ability to shut down portions of the Internet in the event of a coordinated malicious cyber attack, according …
CloudAudit joins the Cloud Security Alliance
The Cloud Security Alliance (CSA) announced that CloudAudit has become an official project of the CSA, with the joint mission of promoting the use of best practices for …
iOS security loophole allows access to passcode-protected iPhone
A security hole in Apple iOS 4.1 allows anyone to bypass the passcode screen and access certain functions of the iPhone. To do that, you must hit the “Emergency …
Bredolab botnet beheaded
Botnet takedowns have become a common occurrence this year, and the last one to be hit is Bredolab. Counting some 30 million bots and nearly 150 command and control centers, …
Iranian Cyber Army behind TechCrunch Europe hack?
Political hacking might give the perpetrators a sense of accomplishment and some personal satisfaction, but will rarely bring them money. Since they obviously already have the …
.com is the most dangerous domain
The world’s most heavily trafficked web domain, .COM, is now the riskiest, according to McAfee’s “Mapping the Mal Web” report released today. Fifty-six …
Fabric weaves security into program code
Wouldn’t it be wonderful if we could build security into a program as it is written? This idea spurred a number of researchers from Cornell University to try and develop …
Breaking web browsers
In the video below, Jeremiah Grossman, the founder and CTO of WhiteHat Security, talks about breaking web security. The video was recorded at the OWASP AppSec USA 2010 conference.
80% of firms don’t know who should secure cloud data
The cloud is still akin to the Wild West when it comes to the security of the data hosted there, according to Courion. In fact, 1 in 7 companies admit that they know there are …
Featured news
Resources
Don't miss
- Treating MCP like an API creates security blind spots
- Offensive cyber power is spreading fast and changing global security
- Enterprise password audits made practical for busy security teams
- What zero trust looks like when you build it step by step
- Social data puts user passwords at risk in unexpected ways