Trend Micro blocks phishing attempt from “Trend Micro”
It must have been a special pleasure for Trend Micro to block access to the phishing URL and domain that used their name and reputation to scam people. Their analysts came …
FBI’s network against cyber crime
Last week, when the Senate’s Subcommittee on Terrorism and Homeland Security held a hearing entitled “Cybersecurity: Preventing Terrorist Attacks and Protecting …
iPhone worm turns devices into zombies
It took three weeks for someone to again take advantage of the vulnerability that leaves the owners of jailbroken iPhones exposed to attacks, and this time the attack is …
Latest 0-day Internet Explorer exploit
A new exploit made public by an unknown individual on the BugTraq mailing list on Friday could be soon used for attacking unsuspecting surfers that use Internet Explorer 6 and …
New risk management ISO standard
The new ISO standard for effective management of risk ISO 31000 provides principles, framework and a process for managing any form of risk in a transparent, systematic and …
Workers stealing data for competitive edge
The recession is creating camaraderie amongst workforces, at the expense of their employers, is the finding of a transatlantic survey. Carried out amongst 600 office workers …
Week in review: Zbot Trojan arrests, 0-day Firefox vulnerabilities and new (IN)SECURE Mag
Here’s an overview of some of last week’s most interesting news, interviews and articles: Most security products fail to perform Nearly 80 percent of security …
Zero-day vulnerabilities in Firefox extensions discovered
One of the reasons behind Firefox’s popularity is the availability of a vast library of extensions. Users use them to modify the browser to their liking and make their …
Three charged with Comcast.net hijacking
Three men were charged on Thursday for last year’s redirecting of traffic of Comcast’s website to a site where a shout-out to fellow hackers was featured: …
Cloud computing security benefits, risks and recommendations
How can businesses and governments get the obvious benefits of cloud computing without putting their organization at risk? ENISA (the European Network and Information Security …
Poisoned Google search results
Google has been and is very helpful – no doubt about it. But it seems to me that they should try to do something about the poisoned search results problem, otherwise …
World’s first wireless USB external hard drive
Imation announced its Pro WX Wireless USB hard drive that provides 1.5TB of storage. With a fast Wireless USB data transfer rate of up to 15MBs/second, the product can back up …
Featured news
Resources
Don't miss
- Your encrypted data is already being stolen
- REMnux v8 brings AI integration to the Linux malware analysis toolkit
- LockBit 5.0 ransomware expands its reach across Windows, Linux, and ESXi
- Microsoft equips CISOs and AI risk leaders with a new security tool
- OpenClaw creator Peter Steinberger joins OpenAI