Google applicants targeted by phony job application response
People who have applied for a position at Google are in danger of being duped by a malicious email purporting to come from Google, thanking the recipients for sending in their …
Twitter users asked to reset their passwords after phishing attack
Many Twitter users have been locked out of their accounts today, following a suspected phishing attack. They received a message stating: “Due to concern that your …
73% share online banking password
The vast majority of online banking customers reuse their login credentials to access non-financial and much less secure websites. Trusteer found that 73 percent of bank …
XSS vulnerability in Cisco Security Tools
Core Security issued an advisory disclosing a vulnerability that could affect large numbers of organizations using Cisco’s Secure Desktop security package and leave …
U.S. strategy for cyberwar and cyberterrorism
The Cyber Secure Institute published a whitepaper by Gen. Eugene Habiger USAF (ret.). who formerly served as Commander in Chief of United States Strategic Command. He also …
Man gets serious jail time for identity theft scheme
Martel T. Kirkland was sentenced today to 15 years in prison for conspiracy, mail fraud, aggravated identity theft, credit card fraud, wire fraud, uttering a forged security, …
Beware of Chinese bearing gifts
UK businessmen have been warned by the British security service against using “gifts” such as memory sticks or cameras given to them when attending exhibitions or …
SecretBox: Keep your secrets safe
An alternative to 1Password, App4Mac’s SecretBox lets you store all sorts of information: credit card details, SSN numbers, software licenses, e-mail account details, …
Facebook tops the list of risky social networking sites
Social networks may represent one of the most common infection and data loss vectors today, but it’s patently obvious that they are here to stay. Looking at them from a …
Netgear releases new gateway security appliance
Netgear unveiled a new gateway security appliance – the ProSecure UTM5, which enables small companies to protect themselves using a wide array of defenses including …
Cloud computing not as safe as they want you to think
Cloud computing has been touted as the perfect solution for our increasingly mobile life-style – everything we need is always online and always accessible. The …
Multi-purpose fuzzer zzuf
zzuf is a transparent application input fuzzer. Its purpose is to find bugs in applications by corrupting their user-contributed data (which more than often comes from …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations