Facebook security bug lets you eavesdrop on your friends’ chats
On Wednesday morning, a Facebook security flaw allowed users for a few hours to get a glimpse at their friends’ private chats and their their latest pending …
Freeware detects performance loss across the network
Disk Performance Analyzer for Networks 3.0 (DPAN) is a free utility that detects and reports severe fragmentation-related performance loss across the network, all from one …
Facebook Social Plug-ins privacy concerns sorted out by Palo Alto Networks
Facebook users in enterprises are susceptible to having their confidential data shared with third parties because of recent changes at Facebook, which cause behavioral data …
Fake Adobe Security Update malware campaign
Red Condor issued a warning of a new malware threat crafted to appear as an email thread discussing vulnerabilities in Adobe software. The campaign targets Adobe customers and …
Compliance Enforcer 3.0 released
Compliance Enforcer 3.0 leverages nexTier’s DLP algorithms with semantic analysis to provide end-users with auto-classification features, the ability to customize …
Qualys and RSA expand IT-GRC collaboration
Qualys and RSA expanded their technology collaboration to make QualysGuard vulnerability management and IT policy compliance data available to RSA’s client base. The …
Ex-con helps feds foil an ATM hacking scheme
Thor Alexander Morris had a plan. The plan involved reprograming certain ATMs so that they would overpay him when he made a withdrawal, giving out $20 instead of $1 bills …
Lessons to be learned from Facebook privacy changes
The recent Facebook privacy changes, the public outcry they caused and the petition by a group of U.S. senators to the Federal Trade Commission to restrict the amount of …
Google’s new Web application security course
As a part of its effort to educate Web application developers on how to sidestep common programming mistakes that leave the doors open for attackers, Google has unveiled a …
Demonstration of Facebook account credentials theft
When you use a computer other than your own, you have to be especially careful about what online accounts you access – particularly if the computer in question is in a …
Money mules wanted
Reading about people unwittingly becoming money mules for cybercriminals, a lot of people wonder if they would be able to spot if the offer they received or searched for is …
Analyze the network behavior of unknown malware samples
The aim of the INetSim project is to perform a quick run-time analysis of the network behavior of unknown malware samples in a laboratory environment. Modules for the …
Featured news
Resources
Don't miss
- 40 open-source tools redefining how security teams secure the stack
- Password habits are changing, and the data shows how far we’ve come
- Product showcase: Tuta – secure, encrypted, private email
- Henkel CISO on the messy truth of monitoring factories built across decades
- The hidden dynamics shaping who produces influential cybersecurity research