Critical Adobe Flash, Reader 0-day flaw exploited in the wild
A zero-day flaw affecting 10.0.x and 9.0.x versions of Adobe Flash Player – including the current version, which is 10.0.45.2 – has been spotted being exploited in …
Week in review: Flaw-ridden smartphones, Facebook app verification and malware-writing researchers
Here’s an overview of some of last week’s most interesting news and articles: Critical vulnerabilities in Photoshop CS4 Critical vulnerabilities have been …
Rootkits on Android smartphones
As our mobile phones get “smarter” and our personal and professional lives get increasingly mobile, the possibility of these devices getting compromised and the …
iPad phishing scheme advertised on Facebook
How would you like to get one of the much-anticipated iPad gizmos in exchange of simply filling up a mere survey? Well, the offer sounds pretty good – in fact, it sounds …
Laptop theft exposes private info of AvMed Health Plans’ customers
Current and former AvMed Health Plans members’ personal information may have been affected by the theft of laptop computers from the company’s offices. In December …
Top 5 FIFA World Cup online risks
Lavasoft warned computer users to be aware of stealthy online traps set by cybercriminals to leverage public interest surrounding the 2010 FIFA World Cup – and issued …
Instant messenger phishing made simple
An Internet application “comes to the rescue” of MSN & YIM users who want to find out if their friends, colleagues or acquaintances have blacklisted them. It …
Facebook fights rogue apps with verification program
In view of all the rogue applications that have lately targeted Facebook users, the announcement that the social network will require developers to verify their Facebook …
Rogue software details: Security Master AV
Security Master AV is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Virtualized mobile computing on a secure flash drive
Absolute Identification and Kanguru Solutions released their collaborative product, the RocIT Defender Elite; a secure, pocket-sized virtualized mobile computing platform …
U.S. Senators keep trying to give “cyber emergency” powers to federal government
Not so long ago, a simulated cyber attack showed the unpreparedness of the United States to deal effectively with such an occurrence. When the officials “playing” …
Steady increase of generic malware
Sunbelt Software announced the top 10 most prevalent malware threats for the month of May 2010. Eight of the top 10 detections for May are reflecting the trend toward …
Featured news
Resources
Don't miss
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground
- Open source has a malware problem, and it’s getting worse