Email security trends
Proofpoint announced findings from a survey of 122 RSA Conference 2010 attendees, conducted at its exposition booth, about email security trends. Key findings from the survey …
Remote access app for iPhone and iPod touch
TeamViewer released TeamViewer and TeamViewer Pro iPhone. Designed for iPhone or iPod touch, from versions 2.2.1 and newer, the applications access or control remote Windows …
Mariposa bot distributed by Vodafone’s infected phone
Following yesterday’s news about the Energizer DUO USB recharger that infects PCs with a Trojan, here is another piece of equipment whose software comes bundled with …
Setting up a mobile botnet is alarmingly easy to do
The relative easiness of setting up a mobile botnet of nearly 8,000 phones has been demonstrated by Derek Brown and Daniel Tijerina at this year’s edition of the RSA …
“Highly critical” Opera vulnerability discovered
A highly critical buffer overflow vulnerability affecting the Opera browser has been discovered by Marcin Ressel of Secunia: The vulnerability is caused due to an error when …
Serious Apache vulnerability disclosed
A serious vulnerability in Apache’s HTTP web server that enables the attacker to gain remote access to the server and total control of a database, has been discovered by …
There is a social engineering scheme for everyone
The human factor is the weakest link of the security chain – this statement has been said and written so many times, that is starting to become a cliche’. Even so, …
Spear phishing aimed at high-value targets increases
Spear phishing aimed at high-value targets increases The Anti-Phishing Working Group (APWG) released its Q4, 2009 Phishing Activity Trends Report, which reveals that eCrime …
USB battery charger installs Trojan
The software that shows to which extent the battery is charged through the Energizer DUO USB recharger comes bundled up with a Trojan, says US CERT. The installer file for the …
Zuckerberg hacked into journalists’ email?
The renowned Facebook co-founder has been accused three years ago of stealing the source code and the business plan for the social network from some Harvard colleagues and for …
Fake drug peddlers hijack academic websites
Legal sites are often compromised and used as a stepping stone through which the user is taken to a malicious site. The latest of this kind of schemes has seen a string of …
Week in review: Aurora prevention, RSA Conference, and Mariposa botnet takedown
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Severe IE vulnerability threatens Windows XP users News of a …
Featured news
Resources
Don't miss
- F5 data breach: “Nation-state attackers” stole BIG-IP source code, vulnerability info
- Microsoft patches three zero-days actively exploited by attackers
- U.S. seizes $15 billion in Bitcoin linked to massive forced-labor crypto scam
- A safer way to break industrial systems (on purpose)
- Maltrail: Open-source malicious traffic detection system