A “private” banking Trojan competes with ZeuS
The recent surge of brand new banking Trojans continues to give us more things to worry about. The latest one is named “Feodo”, and it has been around for months …
Facebook works on solution to stop inadvertent user ID sharing
The recent discovery that various third-party application on Facebook were sending users’ ID numbers and/or names to advertising agencies every time the users click on …
RSYaba: Modular brute force attacker
RSYaba allows you to run brute force attacks against various services in a similar way to Hydra and Medusa. The tool is written in Ruby so modifying the scripts is a lot …
Fake MS Security Essentials peddles rogue AV products
I was wondering when will rogue AV peddlers start using the name of a real AV product, and now I have my answer. F-Secure has detected one called Microsoft Security Essentials …
Five tips for safe computer use
Panda Security released a list of the top five tips that computer users should follow to ensure a safe and secure online experience. With the exponential growth of social …
Open source cloud alternative
Open source cloud computing platform OpenStack announced the “Austin” code release of Compute and Object Storage. Since the project’s inception three months …
Adobe patches InDesign
An important library-loading vulnerability has been identified in Adobe InDesign CS5 7.0.2 and earlier, InDesign Server CS5 7.0.2 and earlier, and InCopy CS5 7.0.2 and …
Fake Stuxnet removal tool wreaks havoc
The Stuxtnet Trojan hit the headlines pretty hard, and people around the world feared that their system was compromised, too. Among the legitimate Stuxnet removal tools that …
Sensitive prisoner data found discarded in dumpster
When a homeless couple went searching for recyclable things in a gas station dumpster in California last week, they probably didn’t expect to find files containing …
Pentagon to aid DHS in case of cyber attack on domestic soil
It is a well know fact that the U.S. Department of Defense is forbidden to deploy military units within the nation’s boarders for law enforcement purposes. The only …
Integrating Hydra with Nessus
The video below shows you how to integrate custom username and password dictionaries with Hydra to your Nessus scans.
Apple updates Java for Mac OS X 10.5 and 10.6
The latest Java updates from Apple deliver improved reliability, security, and compatibility. Java for Mac OS X 10.5 Update 8 supersedes all previous updates of Java for Mac …
Featured news
Resources
Don't miss
- Webinar: Beyond the Quadrant: An Analyst’s Guide to Evaluating Email Security in 2026
- CISO Assistant: Open-source cybersecurity management and GRC
- Firmware scanning time, cost, and where teams run EMBA
- How AI image tools can be tricked into making political propaganda
- Product showcase: Orbot – Tor VPN for iOS