European banks lack document security
Financial services companies across Europe are unintentionally putting their confidential information at risk, according to research from Ricoh. At the heart of the issue is …
Brandjacking: Online brand abuse soars
Online brand abuse rose across major industries in 2009 according to the MarkMonitor Brandjacking Index. The report reveals the total number of phishing attacks was at an …
The rise of amateur-run botnets
It used to be that cyber criminals were people with a highly technical skill set, but this is not the norm anymore. This fact became obvious some two weeks ago when news of …
News of Corey Haim’s funeral lead to fake AV
Corey Haim’s death is old news by now, but fans of the prematurely deceased teen idol are still on the lookout for information concerning his death. Those interested in …
Rogue software details: Smart Security
Smart Security is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Collection of security checks for Linux
Buck Security is a collection of security checks for Linux. It was designed for Debian and Ubuntu servers, but can be useful for any Linux system. The aim of Buck Security is, …
Introducing the Cyber Defence conference
Cyber warfare has become a major concern for international governments, military and civil agencies over the past few years. A recent wave of cyber attacks against NATO member …
Week in review: Compromised hardware, AV failures and published IE 0-day exploit
Here’s an overview of some of last week’s most interesting news, articles and interviews: Zuckerberg hacked into journalists’ email? The Facebook co-founder …
The threat landscape is changing, AV fails to adjust
A recent testing conducted by NSS Labs presented us with some deplorable results: of the seven antivirus products tested two weeks after the IE bug used for breaching Google …
Apple Safari 4.0.5 patches critical vulnerabilities
Safari 4.0.5 includes improvements to performance, stability, and security. ColorSync An integer overflow that could result in a heap buffer overflow exists in the handling of …
Playstation emulator installs malware
Playing again the games you used to amuse yourself with for hours some years ago could bring a smile to your face, but it could also get your computer infected. Searching for …
PeerSec MatrixSSL: Embedded SSL and TLS implementation
MatrixSSL is an embedded SSL implementation designed for small footprint applications and devices. It allows secure management of remote devices. PeerSec Networks offers a …
Featured news
Resources
Don't miss
- Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257)
- FAPI 2.0: How the OpenID Foundation is enabling scalable interoperability in global healthcare
- pqcscan: Open-source post-quantum cryptography scanner
- Bitdefender PHASR: Proactive hardening demo overview
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)