The cookie that won’t go away
A proof-of-concept JavaScript API that manufactures persistent cookies and stores them in several types of storage mechanisms has been developed by security hacker Samy …
Software security testing – interest is high, security is low
In the past six months alone there have been multiple new zero-day vulnerabilities reported in Microsoft Windows and widely covered uneasiness about the security of mobile …
Theories about Stuxnet’s goal and authors abound
The quality of its code, the stolen certificates used to digitally sign it, the specifically targeted configuration, the four 0-day Windows vulnerabilities it exploits to …
Breakdown of security weaknesses by industry and organization size
WhiteHat Security released the tenth installment of its Security Website Security Statistics Report, providing a first-time breakdown of the state of website security by …
Trojan stealing private key certificates
As you may have already noticed, malware peddlers have realized that their wares have a greater chance of being loaded by the targeted system if they are digitally signed. The …
Cybersecurity tips for the enterprise
With the recent rise in malvertising, high-impact data breaches and other malicious security threats, the practices and secure infrastructure of legitimate marketers …
New software improves ability to detect malware in cloud-computing systems
Researchers from North Carolina State University have developed new software that offers significantly enhanced security for cloud-computing systems. The software is much …
A standardized format for cybercrime reporting
“Cybercrime is emerging as a very concrete threat. Considering the anonymity of cyberspace, it may in fact be one of the most dangerous criminal threats ever,” …
Phishers still favor spam over social networking sites
SpamTitan Technologies announced the findings of its latest survey of SMBs on the continued danger of phishing attacks, and it shows that despite media reports about the rise …
Trojan posing as installer wants your money
A Trojan masquerading as an installer for well-known applications such as DivX, μTorrent, LimeWire, Avast! Antivirus and others has been popping up on users’ …
XSS Twitter flaw used to expose users to potentially malicious sites
Earlier this morning, Sophos begin to warn people about a new Twitter XSS flaw that is being used by malicious individuals to redirect users to third-party websites without …
Win free tickets for GRC 2010 in Lisbon
At the end of October, an event named GRC 2010 is to be held in Lisbon, Portugal, and it proposes to bring to its participants the main challenges that managers involved in …
Featured news
Resources
Don't miss
- January 2026 Patch Tuesday forecast: And so it continues
- How AI agents are turning security inside-out
- Security teams are paying more attention to the energy cost of detection
- Recently fixed HPE OneView flaw is being exploited (CVE-2025-37164)
- PoC released for unauthenticated RCE in Trend Micro Apex Central (CVE-2025-69258)