Find potential exploit conditions in Microsoft Office documents
OfficeCat is a command line utility developed by the Sourcefire VRT that can be used to process Microsoft Office Documents to determine the presence of potential exploit …
Trojans dominate BitDefender’s top 10 e-threats list
The top spot on BitDefender’s top 10 e-threats list for October is once again Trojan.Clicker.CM, which is mostly present on websites hosting illegal applications such as …
Top causes of identity fraud
Identity fraud increased substantially in 2008, reversing a four-year trend of decreasing incidents. Researchers say identity fraud increased by 22 percent last year and they …
Facebook spamming practices revealed
Dennis Yu, the CEO of BlitzLocal, was a guest yesterday on TechCrunch, and he shared his thoughts and knowledge about Facebook spamming and advertising. BlitzLocal is an …
Global security best practices
The latest Microsoft Security Intelligence Report shares security best practices from countries that have consistently exhibited low malware infection. These best practices …
Worm infections in the enterprise rose by nearly 100%
The latest Microsoft Security Intelligence Report (SIRv7), which indicates that worm infections in the enterprise rose by nearly 100 percent during the first half of 2009 over …
Convicted social networks “hacker” commits suicide
StudiVZ, a social network for students based in Berlin and the German answer to (and clone of) Facebook, has been hit by unpleasant news. TechCrunch Europe reports that the …
Woman fired as a result of error in FBI criminal database
Ages ago when I first saw “The Net”, an action thriller featuring Sandra Bullock as a computer expert whose life gets turned upside down by hackers who have access …
Record levels of spam, malware and Web-based threats
The number of new file-sharing sites hosting unauthorized, copyrighted content skyrocketed over the last three months, according to McAfee’s latest report. It also shows …
Week in review: Malicious email attachments, phishing trends, China’s cyber army and Halloween attacks
Here is an overview of some of last week’s most interesting news, interviews and articles: Q&A: Malware threats, Windows 7 and cyber crime Bo Olsen is a malware …
Facebook spammer has to pay big money
Facebook has won the court battle against Sanford Wallace, one of the spammers who obtained access to people’s accounts and used them to spam their friends. He is …
DHS to open new cyber operations center
During a roundtable at RSA Conference Europe last week, Philip Reitinger, U.S. Department of Homeland Security (DHS) Deputy Under Secretary for the National Protection and …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations