Black hat hackers on demand
Everybody knows that malicious hacking is illegal, but there are services out there that seem not very concerned with the fact. Some of them have been operating for 3 years …
The value of stolen credentials
The rapid evolution of Web 2.0 services and the parallel world of cybercrime is driving a revolution in the price that criminals charge each other for user credentials. The …
iPhone OS 3.1.3 patches security issues
iPhone OS 3.1.3 deals with several security issues outlined below. CoreAudio A buffer overflow exists in the handling of mp4 audio files. Playing a maliciously crafted mp4 …
Five months to detect a breach
When it comes to cyber attacks and breaches, the hospitality industry has been the most heavily targeted industry in 2009. This surprising information is among the findings …
(IN)SECURE Magazine issue 24 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 24 has been released today. Table of contents …
The truth about identity theft
Over the past five years, identity theft has become a growing, nationwide concern annually affecting approximately 10 million Americans. It’s an issue that is difficult …
Using social networks inadvisable without proper protection
While the advantages of social networks are obvious after a short period of use, the risks resulting from them are generally disregarded by their users, according to …
Google applicants targeted by phony job application response
People who have applied for a position at Google are in danger of being duped by a malicious email purporting to come from Google, thanking the recipients for sending in their …
Twitter users asked to reset their passwords after phishing attack
Many Twitter users have been locked out of their accounts today, following a suspected phishing attack. They received a message stating: “Due to concern that your …
73% share online banking password
The vast majority of online banking customers reuse their login credentials to access non-financial and much less secure websites. Trusteer found that 73 percent of bank …
XSS vulnerability in Cisco Security Tools
Core Security issued an advisory disclosing a vulnerability that could affect large numbers of organizations using Cisco’s Secure Desktop security package and leave …
U.S. strategy for cyberwar and cyberterrorism
The Cyber Secure Institute published a whitepaper by Gen. Eugene Habiger USAF (ret.). who formerly served as Commander in Chief of United States Strategic Command. He also …
Featured news
Resources
Don't miss
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground
- Open source has a malware problem, and it’s getting worse
- Train smarter, respond faster: Close the skill gaps in your SOC