Please turn on your JavaScript for this page to function normally.
Microsoft releases five critical security bulletins

Another Patch Tuesday and Microsoft comes out with a variety of patches, and this series is quite serious. Users are recommended to update as soon as possible. The critical …

Downloaders may piggyback on unsecured WLAN to flout new UK laws

Sophos is warning computer users of the importance of properly securing their Wi-Fi networks following reports that people who illegally download music and films may have …

Research shows that identity fraud is in decline

The 2008 Identity Fraud Survey Report – released by Javelin Strategy & Research – confirms that identity fraud is declining in most parts of the United …

Report: Web browsers under siege from organised crime

IBM today released the findings of the 2007 X-Force Security report, detailing a disturbing rise in the sophistication of attacks by criminals on Web browsers worldwide. …

Apple released security update 2008-001

The fresh security update addresses the following: Directory Services – A local user may be able to execute arbitrary code with system privileges. A stack buffer …

500 Gbps firewalling performance

Clavister AB, provider of IP-based security and UTM solutions, today declared a new world record in network security throughput. Tests show that the new Clavister technology …

Research reveals majority of consumers concerned over mobile safety

McAfee announced findings from new research that reveals that almost three out of four mobile consumers (72%) are concerned about the security of today’s and …

Local root exploit on openSUSE 10.2/10.3

Marcus Meissner from the SUSE security team sent the following to the opensuse-security-announce mailing list: As you are undoubtly aware a new local root exploit has been …

P2P file sharing may be 2008’s greatest identity theft threat

According to the Identity Theft Assistance Center, a national non-profit coalition dedicated to protecting consumers from identity theft, throughout 2008 “criminals will …

PCI PED equipment approval listings and security requirements

The PCI Security Standards Council announced that PCI PED equipment approval listings and security requirements documents are available on the Council’s website. With …

Undercover: Authentication Usable in Front of Prying Eyes

Abstract from the whitepaper by authors Hirokazu Sasamoto, Nicolas Christin and Eiji Hayashi: A number of recent scams and security attacks hinge on a crook’s ability to …

Google spoofing worm and other malware of the week

Percoban.A reaches computers disguised as a Word file. When run, it makes a copy of itself with names such as Rahasiamu.exe or Jangan Dibuka.exe. It also creates a Windows …

Don't miss

Cybersecurity news