Please turn on your JavaScript for this page to function normally.
Password-stealing Trojans target World of Warcraft gamers

It’s the way of the world: where a lot of people congregate, there will always be pickpockets. What is true for the real world, is true for the cyber one, too. Gaming is …

Trade body loses unencrypted laptop with data on 37,000 people

Repair Management Services of Blackburn, the trade association representing car repair companies, has lost a laptop containing the personal details of 37,000 people and …

Adium 1.3.6 fixes critical vulnerability

Adium 1.3.6 is now available. It includes an updated version of libpurple which fixes the vulnerability revealed earlier this week which has the potential to allow another …

Web, application server and Web 2.0 fingerprinting tool AppPrint

Security researcher Shreeraj Shah released the beta version of AppPrint. This tool scans the IP range, IP or host for Web and Application servers. It scans port 80 for a …

OWASP announces International Application Security Conference 2009

Washington DC will be hosting the 2009 OWASP Application Security Conference at the Walter E. Washington Convention Center on November 10-13th, 2009. AppSec DC 2009 will …

Web 2.0 identity verification solution

ReallyWho brings the public records identity verification technology used by financial institutions to social media websites. “We are protecting Web 2.0 identities with …

Symatec points out “dirtiest” Web sites

Norton Safe Web, Symantec’s Web site ratings and reputation service, released the results of their analysis of sites with security risks and compilied the …

Video: Facebook personal information theft

The video below is a demonstration of an attack exploiting a vulnerability in Facebook. In a nutshell, a Facebook user’s personal is stolen. The only thing he does is …

Twitter spammers posting suggestive pictures online

Sophos is warning Twitter users to be wary of new followers posting sleazy images and inviting them to connect on MSN. Spammers have created scores of bogus profiles and …

New book: “My New Mac, Snow Leopard Edition”

Come this September, new Macs will ship with the Snow Leopard operating system. Apple says this version of OS X is “faster, more reliable, and easier to use,” and …

Breach notification regulations from the U.S. Department of Health and Human Services

New regulations requiring health care providers, health plans, and other entities covered by the Health Insurance Portability and Accountability Act (HIPAA) to notify …

Rogue Facebook phishing applications

Sometimes people take it for granted that once they login into Facebook, they don’t have to worry about security threats, but as Rik Ferguson (a researcher for Trend …

Don't miss

Cybersecurity news